From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks., , , и . Int. J. Inf. Sec., 16 (6): 627-639 (2017)3D Network Modeling for THz-Enabled Ultra-Fast Dense Networks: A 6G Perspective., , и . IEEE Commun. Stand. Mag., 5 (2): 84-90 (2021)Interference study between wireless microphone systems and TV White Space devices., , и . ICC, стр. 1874-1878. IEEE, (2012)Security Threats in Network Coding-Enabled Mobile Small Cells., , , , и . BROADNETS, том 263 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 337-346. Springer, (2018)Behavioral Biometrics for Mobile User Authentication: Benefits and Limitations., , , , , и . IFIP Networking, стр. 1-6. IEEE, (2023)An IoT/IoMT Security Testbed for Anomaly-based Intrusion Detection Systems., , , , , и . IFIP Networking, стр. 1-6. IEEE, (2023)Risk-Based User Authentication for Mobile Passenger ID Devices for Land and Sea Border Control., , и . MeditCom, стр. 180-185. IEEE, (2021)Recent Advances of Propagation Channel Research for 6G Wireless Communication Systems., , , и . GLOBECOM (Workshops), стр. 1-6. IEEE, (2021)Intensity normalization of sidescan sonar imagery., , , , , , , , , и . IPTA, стр. 1-6. IEEE, (2016)Self-Organized Energy Efficient Scheduling in LTE-A., , , и . VTC Spring, стр. 1-5. IEEE, (2015)