From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Product Tracking in Supply Chain., , и . Inscrypt, том 7763 из Lecture Notes in Computer Science, стр. 351-370. Springer, (2012)Security for Next-Gen Analytics for Cross-Organisation Collaboration., , и . SECRYPT, стр. 604-609. SCITEPRESS, (2023)Intellectual Property Protection for Distributed Neural Networks - Towards Confidentiality of Data, Model, and Inference., , , и . ICETE (2), стр. 313-320. SciTePress, (2018)Dynamic Context-Aware Access Control - Use of Resource Hierarchies to Define Fine-grained, Adaptable Authorization Policies., и . SECRYPT, стр. 386-393. INSTICC Press, (2007)Fuzzy Distributed Workflows for Crisis Management Decision Makers., , и . EuroISI, том 5376 из Lecture Notes in Computer Science, стр. 226-236. Springer, (2008)Security for Distributed Deep Neural Networks: Towards Data Confidentiality & Intellectual Property Protection., , , и . ICETE (2), стр. 439-447. SciTePress, (2019)Context-Aware Security Policy for the Service Discovery., , и . AINA Workshops (1), стр. 477-482. IEEE Computer Society, (2007)Obligation Based Access Control., и . OTM Workshops, том 8842 из Lecture Notes in Computer Science, стр. 108-116. Springer, (2014)Security for Distributed Machine Learning., , и . SECRYPT, стр. 838-843. SCITEPRESS, (2023)Web based communication between embedded systems and an ERP., , и . INDIN, стр. 551-556. IEEE, (2009)