From post

uiH-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment.

, , , и . KES (2), том 4252 из Lecture Notes in Computer Science, стр. 777-784. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Characterizing client-side caches of audiovisual content sharing services: Findings and suggestions for forensics., , , , , и . J. Inf. Secur. Appl., (2022)Chracer: Memory analysis of Chromium-based browsers., , , и . Forensic Sci. Int. Digit. Investig., 46 (Supplement): 301613 (октября 2023)NTFS Data Tracker: Tracking file data history based on $LogFile., , и . Digit. Investig., (2021)Networking and Storage: The Next Computing Elements in Exascale Systems?, , , , и . IEEE Data Eng. Bull., 43 (1): 60-71 (2020)A method and tool to recover data deleted from a MongoDB., и . Digit. Investig., (2018)A study of user data integrity during acquisition of Android devices., , , , , и . Digit. Investig., 10 (Supplement): S3-S11 (2013)Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers., , , , , , и . J. Cryptol., 19 (4): 441-462 (2006)Impossible Differential Cryptanalysis of Zodiac., , , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 85-A (1): 38-43 (2002)Linear Attack Using Multiple Linear Approximations., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (1): 2-8 (2005)A Study on Stability of the Interacting Multiple Model Algorithm., , и . IEEE Trans. Autom. Control., 62 (2): 901-906 (2017)