From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Achieving fine-grained access control for secure data sharing on cloud servers., , и . Concurr. Comput. Pract. Exp., 23 (12): 1443-1464 (2011)Lattice-valued modal propositional logic and its completeness., и . Sci. China Inf. Sci., 53 (11): 2230-2239 (2010)Security and Attack Vector Analysis of IoT Devices., , , , и . SpaCCS Workshops, том 10658 из Lecture Notes in Computer Science, стр. 593-606. Springer, (2017)Smartphone Bloatware: An Overlooked Privacy Problem., , и . SpaCCS, том 10656 из Lecture Notes in Computer Science, стр. 169-185. Springer, (2017)Probabilistic analysis on mesh network fault tolerance., , , , и . J. Parallel Distributed Comput., 67 (1): 100-110 (2007)Foreword., , и . IEICE Trans. Inf. Syst., 93-D (3): 409-410 (2010)A semantically complete extension sequence of the system L*., и . Sci. China Ser. F Inf. Sci., 46 (2): 81-89 (2003)Sensor Placement with Multiple Objectives for Structural Health Monitoring., , , и . ACM Trans. Sens. Networks, 10 (4): 68:1-68:45 (2014)Hypercube Network Fault Tolerance: A Probabilistic Approach., , и . J. Interconnect. Networks, 6 (1): 17-34 (2005)Enhanced Location Privacy Preserving Scheme in Location-Based Services., , и . IEEE Syst. J., 11 (1): 219-230 (2017)