From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records., , и . Financial Cryptography Workshops, том 12063 из Lecture Notes in Computer Science, стр. 166-176. Springer, (2020)PassApp: My App is My Password!, , , , и . MobileHCI, стр. 306-315. ACM, (2015)CQArank: jointly model topics and expertise in community question answering., , , , , , и . CIKM, стр. 99-108. ACM, (2013)Lightweight RFID Mutual Authentication Protocol against Feasible Problems., , , , и . ICICS, том 7043 из Lecture Notes in Computer Science, стр. 69-77. Springer, (2011)ESUM: an efficient UTXO schedule model., , , , и . ICBC, стр. 1-3. IEEE, (2022)An Improved Scheme for Delegation Based on Usage Control., , , , и . FGCN (1), стр. 74-78. IEEE Computer Society, (2008)OverlapShard: Overlap-based Sharding Mechanism., , , и . ISCC, стр. 1-7. IEEE, (2021)Access Control Model Based on Trust and Risk Evaluation in IDMaaS., , , и . ITNG, стр. 179-184. IEEE Computer Society, (2015)HoneyHash: Honeyword Generation Based on Transformed Hashes., и . NordSec, том 12556 из Lecture Notes in Computer Science, стр. 161-173. Springer, (2020)A Game Theoretic Approach Based Access Control Mechanism., , , , и . ICYCS, стр. 1464-1469. IEEE Computer Society, (2008)