From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Logical Tree Based Secure Rekeying Management for Smart Devices Groups in IoT Enabled WSN., , , , , и . IEEE Access, (2019)Sustainable development challenges in libraries: A systematic literature review (2000--2020), , и . The Journal of Academic Librarianship, 47 (3): 102347 (2021)Going green libraries; Sustainable development challenges; Sustainable development libraries; Sustainable literature reviews.An improved lightweight multiserver authentication scheme., , , , , и . Int. J. Commun. Syst., (2017)Classical versus reinforcement learning algorithms for unmanned aerial vehicle network communication and coverage path planning: A systematic literature review., , , , и . Int. J. Commun. Syst., (2023)An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF., , , , , , и . Internet Things, (июля 2023)A zero watermarking approach for content authentication and tampering detection of Arabic text based on fourth level order and word mechanism of Markov model., , и . J. Inf. Secur. Appl., (2020)Provably secure biometric-based client-server secure communication over unreliable networks., , , , и . J. Inf. Secur. Appl., (2021)Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF., , , , , и . IEEE Trans. Veh. Technol., 70 (11): 12158-12167 (2021)An Intelligent Framework Based on Deep Learning for SMS and e-mail Spam Detection., , , , , и . Appl. Comput. Intell. Soft Comput., (2023)Dynamic offloading strategy for computational energy efficiency of wireless power transfer based MEC networks in industry 5.0., , , , , , , и . J. King Saud Univ. Comput. Inf. Sci., 35 (10): 101841 (декабря 2023)