From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Extending Loose Associations to Multiple Fragments., , , , , и . DBSec, том 7964 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2013)Access Control Models for XML., , , и . Handbook of Database Security, Springer, (2008)Privacy of Outsourced Data., и . PrimeLife, том 320 из IFIP Advances in Information and Communication Technology, стр. 174-187. Springer, (2009)Selective Owner-side Encryption in Digital Data Markets: Strategies for Key Derivation., и . SECRYPT, стр. 620-627. SCITEPRESS, (2021)Multi-Provider Secure Processing of Sensors Data., , , , , , , и . PerCom Workshops, стр. 349-351. IEEE, (2019)Key management for multi-user encrypted databases., , , , , и . StorageSS, стр. 74-83. ACM, (2005)Privacy in Data Publishing., , и . DPM/SETOP, том 6514 из Lecture Notes in Computer Science, стр. 8-21. Springer, (2010)Supporting Concurrency in Private Data Outsourcing., , , , и . ESORICS, том 6879 из Lecture Notes in Computer Science, стр. 648-664. Springer, (2011)Encryption and Fragmentation for Data Confidentiality in the Cloud., , , , , и . FOSAD, том 8604 из Lecture Notes in Computer Science, стр. 212-243. Springer, (2013)Supporting privacy preferences in credential-based interactions., , , , и . WPES, стр. 83-92. ACM, (2010)