From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach., и . ISA, том 76 из Communications in Computer and Information Science, стр. 116-127. Springer, (2010)Application Program Interface as Back-Up Data Source for SCADA Systems., и . ISA, том 200 из Communications in Computer and Information Science, стр. 219-226. Springer, (2011)Biometric Authentication Using Infrared Imaging of Hand Vein Patterns., , , , , и . ISA, том 76 из Communications in Computer and Information Science, стр. 108-115. Springer, (2010)Identification of Plant Using Leaf Image Analysis., , , и . FGIT-SIP/MulGraB, том 123 из Communications in Computer and Information Science, стр. 291-303. Springer, (2010)A Study on the Relationship of Assurance Requirements between K Level of KISEC and EAL Level of CC., , , и . SNPD, стр. 170-176. ACIS, (2003)Similarity Checking of Handwritten Signature Using Binary Dotplot Analysis., и . UCMA (2), том 151 из Communications in Computer and Information Science, стр. 299-306. (2011)Brain Tumor Detection Using MRI Image Analysis., и . UCMA (2), том 151 из Communications in Computer and Information Science, стр. 307-314. (2011)New DoS Defense Method Based on Strong Designated Verifier Signatures., , , и . Sensors, 18 (9): 2813 (2018)Detection of Electronic Anklet Wearers' Groupings throughout Telematics Monitoring., , , , и . ISPRS Int. J. Geo Inf., 6 (1): 31 (2017)E-D2HCP: enhanced distributed dynamic host configuration protocol., , , и . Computing, 96 (9): 777-791 (2014)