From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Temporal Algebra Based on an Abstract Model., и . Australian Database Conference, стр. 301-316. World Scientific, (1993)A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks., , , , и . MobiQuitous, том 73 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 186-197. Springer, (2010)Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks., , , , , , и . Sensors, 16 (4): 460 (2016)A reverse-engineering approach to subsystem structure identification., , , и . Journal of Software Maintenance, 5 (4): 181-204 (1993)Towards security labelling., и . ACSC, том 48 из CRPIT, стр. 69-76. Australian Computer Society, (2006)A non-key based security scheme supporting emergency treatment of wireless implants., , , и . ICC, стр. 647-652. IEEE, (2014)Real-time event detection from the Twitter data stream using the TwitterNews+ Framework., , и . Inf. Process. Manag., 56 (3): 1146-1165 (2019)An Overview Of Temporal Data Mining., , и . AusDM, стр. 83-90. University of Technology Sydney, Australia, (2002)Finding the Optimal Social Trust Path for the Selection of Trustworthy Service Providers in Complex Social Networks., , , и . IEEE Trans. Serv. Comput., 6 (2): 152-167 (2013)A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes., , , , и . Quantum Inf. Process., 14 (2): 697-713 (2015)