From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Efficient Certificate Revocation and Verification Scheme from Multi-Hashing., , и . J. Comput., 7 (6): 1437-1444 (2012)Improved Power Analysis Attack Based on the Preprocessed Power Traces., , , и . GPC, том 9663 из Lecture Notes in Computer Science, стр. 278-289. Springer, (2016)Matching Similar Functions in Different Versions of a Malware., , , , , , и . Trustcom/BigDataSE/ISPA, стр. 252-259. IEEE, (2016)Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis., , , и . TrustCom/BigDataSE, стр. 283-288. IEEE, (2018)Development of a Dual-robot System for Parametric Surfaces Polishing., , и . CAR, стр. 161-165. IEEE Computer Society, (2009)Sink location privacy protection under direction attack in wireless sensor networks., , , , и . Wireless Networks, 23 (2): 579-591 (2017)Fast Protocol Recognition by Network Packet Inspection., , , , и . ICONIP (2), том 7063 из Lecture Notes in Computer Science, стр. 37-44. Springer, (2011)