Starostin, Vladimir
87  results:
Search for persons X
?
2

Vulnerability of the Key Sharing Protocol Executing over th..:

, In: 2024 35th Conference of Open Innovations Association (FRUCT),
 
?
3

Experimental Investigations of the Watermarking System for ..:

, In: 2023 16th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS),
 
?
5

Channel Traffic Minimizing Key Sharing Protocol Intended fo..:

, In: 2022 32nd Conference of Open Innovations Association (FRUCT),
 
?
 
?
8

Information theoretical secure key sharing protocol for noi..:

, In: 2019 Federated Conference on Computer Science and Information Systems (FedCSIS),
 
?
11

DESIGN IN THE POST-INDUSTRIAL ERA: THE ETHICAL IN THE AESTH..:

Starostin, Vladimir Petrovich
Historical, Philosophical, Political and Law Sciences, Culturology and Study of Art. Issues of Theory and Practice; Historical, Philosophical, Political and Law Sciences, Culturology and Study of Art. Theory and Practice; Исторические, философские, политические и юридические науки, культурология и искусствоведение. Вопросы теории и практики; Historical, Philoso....  , 2018
 
?
13

Advice on describing Bayesian analysis of neutron and X-ray..:

Mccluskey, Andrew R ; Caruana, Andrew J ; Kinane, Christy J...
Mccluskey , A R , Caruana , A J , Kinane , C J , Armstrong , A J , Arnold , T , Cooper , J F K , Cortie , D L , Hughes , A V , Moulin , J F , Nelson , A R J , Potrzebowski , W & Starostin , V 2023 , ' Advice on describing Bayesian analysis of neutron and X-ray reflectometry ' , Journal of Applied Crystallography , vol. 56 , no. 1 , pp. 12-17 . https://doi.org/10.1107/S1600576722011426.  , 2023
 
1-15