From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Patterns of Designer-User Interactions in the Design Refinement Process., и . PACIS, стр. 114. (2014)The Study on Health Information Characteristics and Privacy.. J. Medical Imaging Health Informatics, 10 (11): 2543-2550 (2020)Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService., , , , и . IEEE Trans. Mob. Comput., 9 (6): 824-837 (2010)Attribute-based Access Control using Combined Authentication Technologies., , и . GrC, стр. 518-523. IEEE, (2008)Patterns of Designer-User Interactions in the Design Innovation Process., и . AMCIS, Association for Information Systems, (2014)Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data., , , и . Secure Data Management, том 4165 из Lecture Notes in Computer Science, стр. 75-83. Springer, (2006)Virtualized Security Defense System for Blurred Boundaries of Next Generation Computing Era.. FSDM, том 293 из Frontiers in Artificial Intelligence and Applications, стр. 208-219. IOS Press, (2016)PPIDS: Privacy Preserving Intrusion Detection System., , , и . PAISI, том 4430 из Lecture Notes in Computer Science, стр. 269-274. Springer, (2007)Privacy-Aware Access Control through Negotiation in Daily Life Service., , и . ISI Workshops, том 5075 из Lecture Notes in Computer Science, стр. 514-519. Springer, (2008)Secure Information Sharing System for Online Patient Networks.. Secur. Commun. Networks, (2019)