From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A lightweight password-based authentication protocol using smart card., , , и . Int. J. Commun. Syst., (2017)Robust App Clone Detection Based on Similarity of UI Structure., , , , , и . IEEE Access, (2020)Optimizing the Trapping (Transport) Efficiency in Regular Branched Networks., , и . IEEE Trans. Netw. Sci. Eng., 9 (3): 1308-1318 (2022)CrowdLBM: A lightweight blockchain-based model for mobile crowdsensing in the Internet of Things., , , и . Pervasive Mob. Comput., (2022)Differential Fault Attack on ITUbee Block Cipher., , , , и . ACM Trans. Embed. Comput. Syst., 16 (2): 54:1-54:10 (2017)Ethereum Name Service: the Good, the Bad, and the Ugly., , , , , и . CoRR, (2021)DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network., , , , и . ACM Trans. Softw. Eng. Methodol., 30 (3): 38:1-38:33 (2021)A color image watermarking algorithm resistant to print-scan., , , , и . WCNIS, стр. 518-521. IEEE, (2010)Characterizing cryptocurrency exchange scams., , , , , , , и . Comput. Secur., (2020)A New Efficient Hierarchical Multi-secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations., , , , , и . IACR Cryptol. ePrint Arch., (2020)