From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers., , и . ISPEC, том 4464 из Lecture Notes in Computer Science, стр. 177-192. Springer, (2007)Secure the image-based simulated telesurgery system., , , и . ISCAS (2), стр. 596-599. IEEE, (2003)VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples., , , , и . ESORICS (2), том 10493 из Lecture Notes in Computer Science, стр. 229-246. Springer, (2017)An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods., , и . ICISC, том 2015 из Lecture Notes in Computer Science, стр. 162-170. Springer, (2000)A smart-card-enabled privacy preserving E-prescription system., , , и . IEEE Trans. Information Technology in Biomedicine, 8 (1): 47-58 (2004)Simulating a Multimedia FDDI Backbone Network., , и . Comput. J., 37 (3): 188-198 (1994)MicroBTC: Efficient, Flexible and Fair Micropayment for Bitcoin Using Hash Chains., , , и . J. Comput. Sci. Technol., 34 (2): 403-415 (2019)A Survey on Future Internet Security Architectures., , и . IEEE Access, (2016)Encrypted Big Data Deduplication in Cloud Storage., , , , , и . Smart Data, Chapman and Hall/CRC, (2019)SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications., , , , и . CODASPY, стр. 299-306. ACM, (2018)