From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Welcome message., , и . CNS, стр. 1-2. IEEE, (2013)On throughput efficiency of geographic opportunistic routing in multihop wireless networks., , , и . QSHINE, стр. 41. ACM, (2007)Anonymous communications in mobile ad hoc networks., , и . INFOCOM, стр. 1940-1951. IEEE, (2005)Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing., , , и . INFOCOM, стр. 525-533. IEEE, (2010)Secure Device Pairing., , и . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data., , , , и . IEEE Trans. Parallel Distributed Syst., 25 (1): 222-233 (2014)On Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks., , , и . Mob. Networks Appl., 12 (5-6): 347-357 (2007)Location-based compromise-tolerant security mechanisms for wireless sensor networks., , , и . IEEE J. Sel. Areas Commun., 24 (2): 247-260 (2006)Cognitive security: securing the burgeoning landscape of mobile networks., , , , и . IEEE Netw., 30 (4): 66-71 (2016)A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT., , , , , и . SecureComm (1), том 254 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 3-21. Springer, (2018)