From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Context-sensitive user interfaces for semantic services., , , и . ACM Trans. Internet Techn., 11 (3): 14:1-14:27 (2012)Data Abstraction and Visualisation in Next Step: Experiences from a Government Services Delivery Trial., , и . BigData Congress, стр. 263-270. IEEE Computer Society, (2013)TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs., , , , и . CoRR, (2018)Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication., , , и . IACR Cryptology ePrint Archive, (2017)Behavior-Based Propagation of Trust in Social Networks with Restricted and Anonymous Participation., , и . Comput. Intell., 31 (4): 642-668 (2015)Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps., , , , , , , и . ACM Trans. Cyber Phys. Syst., 3 (4): 36:1-36:21 (2019)DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping., , , и . DAC, стр. 1-6. IEEE, (2020)Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks., , , , , , и . CoRR, (2020)Towards Risk-Aware Cost-Optimal Resource Allocation for Cloud Applications., , , , и . SCC, стр. 210-214. IEEE, (2019)A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage., и . Data Sci. Eng., 1 (3): 149-160 (2016)