From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mapping the File Systems Genome: rationales, technique, results and applications., , , и . CoRR, (2013)RFID security and privacy: long-term research or short-term tinkering?, , , , , , и . WISEC, стр. 160. ACM, (2008)CoLLIDE: CLoud Latency-based IDEntification., , , и . EUSPN/ICTH, том 113 из Procedia Computer Science, стр. 81-88. Elsevier, (2017)Analysis of Polkadot: Architecture, Internals, and Contradictions., , и . Blockchain, стр. 61-70. IEEE, (2022)Secure and Successful Transmission Probability Analysis for PLC Networks., , и . ISNCC, стр. 1-7. IEEE, (2023)Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones., , и . ACSAC, стр. 178-189. ACM, (2023)FN2: Fake News DetectioN Based on Textual and Contextual Features., , и . ICICS, том 13407 из Lecture Notes in Computer Science, стр. 472-491. Springer, (2022)LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks., , , , и . ICPP Workshops, стр. 397-. IEEE Computer Society, (2003)Sanitization of Visual Multimedia Content: A Survey of Techniques, Attacks, and Future Directions., и . CoRR, (2022)Receivers location privacy in avionic crowdsourced networks: Issues and countermeasures., , и . J. Netw. Comput. Appl., (2021)