From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Graph Isomorphism Based Authentication Protocol for Access Control in WLAN., и . AINA Workshops, стр. 229-234. IEEE Computer Society, (2008)Matrix Cipher and Its Application in Computer Security., и . Security and Management, стр. 631-637. CSREA Press, (2008)Existence and uniqueness of mild solution of time-fractional semilinear differential equations with a nonlocal final condition., , , и . Comput. Math. Appl., 78 (5): 1651-1668 (2019)On a terminal value problem for pseudoparabolic equations involving Riemann-Liouville fractional derivatives., , , и . Appl. Math. Lett., (2020)An Efficient Algorithm for Isomorphic Problem on Generic Simple Graphs., и . Asia International Conference on Modelling and Simulation, стр. 824-829. IEEE Computer Society, (2008)Modular Matrix Cipher and Its Application in Authentication Protocol., и . SNPD, стр. 318-323. IEEE Computer Society, (2008)A New S-Box Structure Based on Graph Isomorphism., , и . CIS (1), стр. 463-467. IEEE Computer Society, (2009)Collaborative Vehicle Routing for Auction-based Pickup and Delivery Dispatch Services., и . KSE, стр. 1-6. IEEE, (2019)SecTutor: An Intelligent Tutoring System for Secure Programming., , , , , , , , , и . World Conference on Information Security Education, том 650 из IFIP Advances in Information and Communication Technology, стр. 17-28. Springer, (2022)A Deep Learning-Based Strategy for Vietnamese Incorrect Pronunciation Detection., , , , и . ICSSE, стр. 296-300. IEEE, (2023)