From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Privacy Preserving Security Protocol-Based Application for Wireless Communication System., , , и . HPCC/CSS/ICESS, стр. 1651-1656. IEEE, (2015)Implementation of web application based on Augmentative and Alternative Communication (AAC) method for People with Hearing and Speech Impairment., , и . ICACT, стр. 481-484. IEEE, (2020)Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication., , и . AINA Workshops, стр. 278-282. IEEE Computer Society, (2015)A Closer Look at Attacks on Lightweight Cryptosystems: Threats and Countermeasures., , и . IHCI (2), том 14532 из Lecture Notes in Computer Science, стр. 171-176. Springer, (2023)Hybrid Cloud Service Based Healthcare Solutions., , , , и . AINA Workshops, стр. 25-30. IEEE Computer Society, (2015)Real-Time Streaming Image Based PP2LFA-CRNN Model for Facial Sentiment Analysis., , , , и . IEEE Access, (2020)Blockchain Technology as a Defense Mechanism Against Data Tampering in Smart Vehicle Systems., , и . IHCI (2), том 14532 из Lecture Notes in Computer Science, стр. 20-25. Springer, (2023)PKI-based cryptography for secure cloud data storage using ECC., , , и . ICTC, стр. 194-199. IEEE, (2014)An Effective and Secure User Authentication and Key Agreement Scheme in m-Healthcare Systems., , , , и . HPCC/CSS/ICESS, стр. 1685-1690. IEEE, (2015)An Efficient Hardware Countermeasure against Differential Power Analysis Attack., , , , , и . ICHIT (2), том 206 из Communications in Computer and Information Science, стр. 153-159. Springer, (2011)