From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy-preserving link discovery., , , и . SAC, стр. 909-915. ACM, (2008)Structure-aware graph anonymization., , , , и . Web Intell. Agent Syst., 10 (2): 193-208 (2012)Statistical Database Auditing Without Query Denial Threat., , , и . INFORMS J. Comput., 27 (1): 20-34 (2015)The role mining problem: A formal perspective., , и . ACM Trans. Inf. Syst. Secur., 13 (3): 27:1-27:31 (2010)Enhancing the government service experience through QR codes on mobile platforms., , , , и . Gov. Inf. Q., 31 (1): 6-16 (2014)Enabling Attribute-Based Access Control in NoSQL Databases., , , и . IEEE Trans. Emerg. Top. Comput., 11 (1): 208-223 (января 2023)Automating Security Configuration and Administration: An Access Control Perspective.. IWSEC, том 6434 из Lecture Notes in Computer Science, стр. 1-9. Springer, (2010)Secure and Efficient k-NN Queries., , , и . SEC, том 502 из IFIP Advances in Information and Communication Technology, стр. 155-170. Springer, (2017)Editorial.. IEEE Trans. Dependable Secur. Comput., 17 (1): 1 (2020)Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility., , , , и . IEEE Trans. Dependable Secur. Comput., 12 (5): 504-518 (2015)