From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An anti-spam scheme using pre-challenges., , и . Comput. Commun., 29 (15): 2739-2749 (2006)Integrating wireless sensor networks and the internet: a security analysis., и . Internet Res., 19 (2): 246-259 (2009)The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection., , и . Inf. Secur. Tech. Rep., 12 (1): 24-31 (2007)Feasibility of Societal Model for Securing Internet of Things., , , и . KSII Trans. Internet Inf. Syst., 12 (8): 3567-3588 (2018)Key management systems for sensor networks in the context of the Internet of Things., , , и . Comput. Electr. Eng., 37 (2): 147-159 (2011)A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks., , и . CANS, том 5339 из Lecture Notes in Computer Science, стр. 120-132. Springer, (2008)Security of industrial sensor network-based remote substations in the context of the Internet of Things., , , и . Ad Hoc Networks, 11 (3): 1091-1104 (2013)Selecting key management schemes for WSN applications., , , и . Comput. Secur., 31 (8): 956-966 (2012)Current cyber-defense trends in industrial control systems., , , и . Comput. Secur., (2019)Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks., , и . FOSAD, том 5705 из Lecture Notes in Computer Science, стр. 289-338. Springer, (2009)