From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Return-Map Cryptanalysis Revisited, , и . CoRR, (2005)A novel anti-phishing framework based on honeypots., и . eCrime, стр. 1-13. IEEE, (2009)Influence of leg stiffness on payload capacity at high speed., , , и . ROBIO, стр. 1005-1010. IEEE, (2016)A Socio-Technical and Co-evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems., , , , , , и . DependSys, том 1123 из Communications in Computer and Information Science, стр. 277-293. Springer, (2019)A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system., , , и . J. Syst. Softw., 83 (8): 1443-1452 (2010)A new trust region filter algorithm., и . Appl. Math. Comput., 204 (1): 485-489 (2008)Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks., , , , и . IEEE Trans. Circuits Syst. I Regul. Pap., 66-I (6): 2322-2335 (2019)Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks., , , и . Pervasive Mob. Comput., (2015)Cryptanalysis of a new chaotic cryptosystem based on ergodicity, , , , и . International Journal of Modern Physics B, 23 (05): 651--659 (2009)A Survey of User Perspectives on Security and Privacy in a Home Networking Environment., , и . CoRR, (2022)