From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Prosperity of IT security technologies in homeland defense., , и . J. Ambient Intell. Humaniz. Comput., 5 (2): 169-171 (2014)Distributed Group Key Management for Event Notification Confidentiality Among Sensors., , , , и . IEEE Trans. Dependable Secur. Comput., 17 (3): 566-580 (2020)GRASP-based resource re-optimization for effective big data access in federated clouds., , , и . Future Gener. Comput. Syst., (2016)A Forensic Analysis of Images on Online Social Networks., , и . INCoS, стр. 679-684. IEEE Computer Society, (2011)On the Construction of a False Digital Alibi on the Android OS., , , , и . INCoS, стр. 685-690. IEEE Computer Society, (2011)An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications., , , , и . INCoS, стр. 157-165. IEEE, (2013)Steganography and Secure Communication on Online Social Networks and Online Photo Sharing., , и . BWCCA, стр. 363-368. IEEE Computer Society, (2011)A Novel Anti-forensics Technique for the Android OS., , , и . BWCCA, стр. 380-385. IEEE Computer Society, (2011)Trustworthy Opportunistic Access to the Internet of Services., , , , , , и . ICT-EurAsia, том 7804 из Lecture Notes in Computer Science, стр. 469-478. Springer, (2013)Selection-Based Scheduling Algorithms under Service Level Agreement Constraints., , , и . CSCS, стр. 134-140. IEEE, (2017)