From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph., , и . Fundam. Informaticae, 152 (3): 273-287 (2017)Privacy in RFID and mobile objects.. CoRR, (2013)Characterizing 1-Metric Antidimensional Trees and Unicyclic Graphs., и . Comput. J., 59 (8): 1264-1273 (2016)New Directions in Attack Tree Research: Catching up with Industrial Needs., и . GraMSec@CSF, том 10744 из Lecture Notes in Computer Science, стр. 115-126. Springer, (2017)Robust active attacks on social graphs., , и . Data Min. Knowl. Discov., 33 (5): 1357-1392 (2019)Predictive protocol for the scalable identification of RFID tags through collaborative readers., , , и . Comput. Ind., 63 (6): 557-573 (2012)Attribute evaluation on attack trees with incomplete information., , , , и . Comput. Secur., (2020)Analysis of centrality measures under differential privacy models., , и . CoRR, (2021)Privacy in rfid and mobile objects.. University of Rovira i Virgili, Spain, (2012)Forward Traceability for Product Authenticity Using Ethereum Smart Contracts., , , , и . NSS, том 13787 из Lecture Notes in Computer Science, стр. 514-523. Springer, (2022)