From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication., , , и . IACR Cryptology ePrint Archive, (2017)TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs., , , , и . CoRR, (2018)Data Abstraction and Visualisation in Next Step: Experiences from a Government Services Delivery Trial., , и . BigData Congress, стр. 263-270. IEEE Computer Society, (2013)Context-sensitive user interfaces for semantic services., , , и . ACM Trans. Internet Techn., 11 (3): 14:1-14:27 (2012)Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps., , , , , , , и . ACM Trans. Cyber Phys. Syst., 3 (4): 36:1-36:21 (2019)Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks., , , , , , и . CoRR, (2020)DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping., , , и . DAC, стр. 1-6. IEEE, (2020)Towards Risk-Aware Cost-Optimal Resource Allocation for Cloud Applications., , , , и . SCC, стр. 210-214. IEEE, (2019)Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs., , , , , и . IEEE Trans. Serv. Comput., 15 (5): 2728-2741 (2022)Scheduling Real-Time Security Aware Tasks in Fog Networks., , , , и . IEEE Trans. Serv. Comput., 14 (6): 1981-1994 (2021)