Personensuche
X
?
2018 6th Edition of International Conference on Wireless Networks & Embedded Systems (WECON) ,
1
Combinational Logic Optimization for Ultra-Constrained Appl..:
, In:
?
TENCON 2018 - 2018 IEEE Region 10 Conference ,
2
Construction of a Low Multiplicative Complexity GF (24) Inv..:
, In:
?
2015 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC) ,
3
Smart hybrid energy storage for stand-alone PV microgrid: O..:
, In:
?
2014 IEEE International Workshop on Information Forensics and Security (WIFS) ,
4
Minutiae set to bit-string conversion using multi-scale bag..:
, In:
?
Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction ,
5
MK-pad : a Mouse+Keyboard input technique for distance i..:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Forensics in Telecommunications, Information and Multimedia ,
6
Medical Image Authentication Using DPT Watermarking: A Prel..:
, In:
?
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop ,
7
Analysis of a zero location based authentication scheme for..:
, In:
?
Web Services Security and E-Business ,
9
RFID Systems: Applications vs. Security and Privacy Implica..:
, In:
?
2022 International Visualization, Informatics and Technology Conference (IVIT) ,
10
The Exploration of Emotions from Print Design Course using ..:
, In:
?
The Frontiers Collection; NANO-CHIPS 2030 ,
14