From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How Engineers Deal with Mathematics Solving Differential Equation., , , , , и . ICCS, том 51 из Procedia Computer Science, стр. 1977-1985. Elsevier, (2015)A Protocol to Provide Assurance of Images Integrity Using Memory Cellular Automata.. ACRI, том 4173 из Lecture Notes in Computer Science, стр. 627-635. Springer, (2006)A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata., , и . IbPRIA (1), том 3522 из Lecture Notes in Computer Science, стр. 411-418. Springer, (2005)Graphic Cryptography with Pseudorandom Bit Generators and Cellular Automata., , , , и . KES, том 2773 из Lecture Notes in Computer Science, стр. 1207-1214. Springer, (2003)A Protocol to Cipher Digital Images Based on Cat Maps and Cellular Automata., , и . IbPRIA (1), том 4477 из Lecture Notes in Computer Science, стр. 571-578. Springer, (2007)3D medical data security protection., , и . Expert Syst. Appl., (2016)Modeling epidemics using cellular automata., , и . Appl. Math. Comput., 186 (1): 193-202 (2007)On the invertible cellular automata 150 over Fp., и . Appl. Math. Comput., 219 (10): 5427-5432 (2013)The Use of Linear Hybrid Cellular Automata as Pseudo Random Bit Generators in Cryptography., , , , и . Neural Parallel & Scientific Comp., 12 (2): 175-192 (2004)A multi-secret sharing scheme for 3D solid objects.. Expert Syst. Appl., 42 (4): 2114-2120 (2015)