From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Block diffusion delay attack and its countermeasures in a Bitcoin network., , , и . Int. J. Netw. Manag., (2022)IOTA-Based Access Control Framework for the Internet of Things., , , и . BRAINS, стр. 87-91. IEEE, (2020)Queueing analysis of internet-based call centers with interactive voice response and redial., , , и . CAMAD, стр. 373-377. IEEE, (2012)Analysis of Consecutive Block-Loss for Streaming Services., , , и . ICC, стр. 1-5. IEEE, (2010)Performance analysis of data block synchronization mechanism in coolstreaming., , , и . QTNA, стр. 53-58. ACM, (2010)Mining Pool Selection Problem in the Presence of Block Withholding Attack., , , и . Blockchain, стр. 321-326. IEEE, (2020)Cost-Efficient Blockchain-Based Access Control for the Internet of Things., , , и . GLOBECOM, стр. 1-6. IEEE, (2021)User-search time analysis for hierarchical peer-to-peer overlay networks with time-dependent user-population process., , , и . QTNA, стр. 5:1-5:4. ACM, (2009)Smart Contract-Based E-Voting System Using Homomorphic Encryption and Zero-Knowledge Proof., и . ACNS Workshops, том 13907 из Lecture Notes in Computer Science, стр. 67-83. Springer, (2023)Performance Analysis of Dynamic Lightpath Configuration for WDM Asymmetric Ring Networks., и . NETWORKING, том 2345 из Lecture Notes in Computer Science, стр. 972-983. Springer, (2002)