From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)., , и . IJDSN, 12 (1): 2965438:1-2965438:3 (2016)Information Technology Security Evaluation Using CERT C Secure Coding Standard., , , и . FGIT, том 7105 из Lecture Notes in Computer Science, стр. 335-342. Springer, (2011)Secure RFID Personal Data Management Using Privacy Reference Profile., , , , , и . FGIT, том 7105 из Lecture Notes in Computer Science, стр. 268-276. Springer, (2011)Cell phone-based mobile RFID: models, mechanisms and its security.. IJRFITA, 4 (1): 67-101 (2012)Certificate validation service using XKMS for computational grid., , и . XML Security, стр. 112-120. ACM, (2003)Policy and role based mobile RFID user privacy data management system., , и . NOMS, стр. 1003-1006. IEEE, (2008)Security Frameworks for Open LBS Based on Web Services Security Mechanism., , , , и . ISPA Workshops, том 3759 из Lecture Notes in Computer Science, стр. 609-618. Springer, (2005)Mobile middleware platform for secure vessel traffic system in IoT service environment., и . Secur. Commun. Networks, 9 (6): 500-512 (2016)Web-Browsing Application Using Web Scraping Technology in Korean Network Separation Application., , и . Symmetry, 13 (8): 1550 (2021)A Study on De-Identification of Metering Data for Smart Grid Personal Security in Cloud Environment., и . J. Multim. Inf. Syst., 4 (4): 263-270 (2017)