From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Behavior Based Trustworthy Service Composition Discovery Approach in Cloud Environment., , , , , и . IEEE Access, (2019)Privacy Concerns for Photo Sharing in Online Social Networks., , , и . IEEE Internet Comput., 19 (2): 58-63 (2015)A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds., , , и . Concurr. Comput. Pract. Exp., 27 (8): 2004-2027 (2015)Efficient Encrypted Data Search With Expressive Queries and Flexible Update., , , , , и . IEEE Trans. Serv. Comput., 15 (3): 1619-1633 (2022)Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things., , , , и . IEEE Trans. Ind. Informatics, 14 (8): 3618-3627 (2018)CCA-Secure Deterministic Identity-Based Encryption Scheme., , , , , и . J. Univers. Comput. Sci., 25 (3): 245-269 (2019)SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications., , , , , , , , и . IEEE Internet Things J., 7 (4): 2539-2552 (2020)PIVODL: Privacy-preserving vertical federated learning over distributed labels., , , и . CoRR, (2021)An efficient blind filter: Location privacy protection and the access control in FinTech., , , , , и . Future Gener. Comput. Syst., (2019)A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction., , , , и . Secur. Commun. Networks, 8 (16): 2836-2849 (2015)