From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The phases of large networks with edge and triangle constraints., , , и . CoRR, (2017)Privacy-Preserving Public Auditing for Secure Cloud Storage., , , , и . IEEE Trans. Computers, 62 (2): 362-375 (2013)An Efficient Two-Layer Mechanism for Privacy-Preserving Truth Discovery., , , , , , , и . KDD, стр. 1705-1714. ACM, (2018)Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems., , , , , , , , и . SenSys, стр. 183-196. ACM, (2015)Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing., , , , и . ESORICS, том 5789 из Lecture Notes in Computer Science, стр. 355-370. Springer, (2009)LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks., , и . INFOCOM, IEEE, (2006)Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks., , , и . IEEE Trans. Vehicular Technology, 65 (10): 8331-8344 (2016)Secure and practical outsourcing of linear programming in cloud computing., , и . INFOCOM, стр. 820-828. IEEE, (2011)Effective signal region based analog mixed signal design considering variations and applications., , , , и . SoCC, стр. 233-238. IEEE, (2013)GREP: Guaranteeing Reliability with Enhanced Protection in NFV., , , , , и . HotMiddlebox@SIGCOMM, стр. 13-18. ACM, (2015)