From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Abnormal Traffic Detection Mechanism for Protecting IIoT Environments., и . ICTC, стр. 943-945. IEEE, (2018)Development of the Unified Security Requirements of PUFs During the Standardization Process., , , , , , , и . SecITC, том 11359 из Lecture Notes in Computer Science, стр. 314-330. Springer, (2018)Correction: MPMCT gate decomposition method reducing T-depth quickly in proportion to the number of work qubits., , , , и . Quantum Inf. Process., 22 (11): 421 (ноября 2023)Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones., , , , и . ICTC, стр. 1419-1422. IEEE, (2023)Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security., , , и . IEEE Trans. Consumer Electronics, 66 (1): 11-21 (2020)Security Enhancement for IoT Device using Physical Unclonable Functions., , , и . ICTC, стр. 1457-1459. IEEE, (2019)Rapid Run-Time DRAM PUF Based on Bit-Flip Position for Secure IoT Devices., , , и . IEEE SENSORS, стр. 1-4. IEEE, (2018)UAV arming Authorization using DIM and Flight Authorization Code., и . ICTC, стр. 2065-2067. IEEE, (2022)Reinforcement of IoT Open Platform Security using PUF -based Device Authentication., , и . ICTC, стр. 1969-1971. IEEE, (2022)RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices., , , и . WISA, том 11897 из Lecture Notes in Computer Science, стр. 275-285. Springer, (2019)