From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Host Name Resolution Infrastructure for Overlay Networks., , и . IEICE Trans. Commun., 89-B (9): 2434-2439 (2006)Fast Implementation of KCipher-2 for Software and Hardware., , , , , , и . IEICE Trans. Inf. Syst., 97-D (1): 43-52 (2014)Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet Data., , , и . IoTBDS, стр. 78-87. SCITEPRESS, (2020)Remote Attestation for HDD Files Using Kernel Protection Mechanism., , , и . ICC, стр. 1-6. IEEE, (2010)Cross-Domain Access Control via PKI., , и . POLICY, стр. 202-205. IEEE Computer Society, (2002)Web Tracking Site Detection Based on Temporal Link Analysis., , и . AINA Workshops, стр. 626-631. IEEE Computer Society, (2010)On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters., , и . TrustCom, стр. 1755-1762. IEEE Computer Society, (2012)A Proposal for the Deterrence of Information Leakage Using Anti-virus Software., , , , и . NBiS, стр. 90-96. IEEE Computer Society, (2013)Anomaly Detection for DNS Servers Using Frequent Host Selection., , , , и . AINA, стр. 853-860. IEEE Computer Society, (2009)Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure., , , , , , и . COSADE, том 7864 из Lecture Notes in Computer Science, стр. 169-183. Springer, (2013)