From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications., , , , и . CODASPY, стр. 299-306. ACM, (2018)A Security and Performance Evaluation of Hash-Based RFID Protocols., , и . Inscrypt, том 5487 из Lecture Notes in Computer Science, стр. 406-424. Springer, (2008)Attacking Android smartphone systems without permissions., , , и . PST, стр. 147-156. IEEE, (2016)An intrusion response decision-making model based on hierarchical task network planning., и . Expert Syst. Appl., 37 (3): 2465-2472 (2010)SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network., и . CoRR, (2015)SecComp: Towards Practically Defending Against Component Hijacking in Android Applications., , , и . CoRR, (2016)Statistical Database Auditing Without Query Denial Threat., , , и . INFORMS J. Comput., 27 (1): 20-34 (2015)Towards semantically secure outsourcing of association rule mining on categorical data., , , , , и . Inf. Sci., (2014)Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining., , и . Knowl. Inf. Syst., 17 (2): 217-240 (2008)Design and Implementation of a Secure Prototype for EPCglobal Network Services., , , и . RFIDSec Asia, том 8 из Cryptology and Information Security Series, стр. 45-56. IOS Press, (2012)