From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Heterogeneous differential privacy for vertically partitioned databases., , , , и . Concurr. Comput. Pract. Exp., (2021)Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management., , , , , , , и . IEEE Trans. Netw. Sci. Eng., 7 (4): 2541-2554 (2020)Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment., , , и . IEEE Trans. Parallel Distributed Syst., 31 (3): 695-706 (2020)An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage., , , , , , и . BigDataSecurity/HPSC/IDS, стр. 412-417. IEEE, (2016)Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext., , , , , , и . IAS, стр. 73-78. IEEE, (2015)Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment., , , , , , и . IAS, стр. 61-66. IEEE, (2015)A Trusted Group Signature Architecture in Virtual Computing Environment., , , и . ATC, том 5060 из Lecture Notes in Computer Science, стр. 73-85. Springer, (2008)A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment., , , , и . UIC, том 5061 из Lecture Notes in Computer Science, стр. 35-45. Springer, (2008)Theory and methodology of research on cloud security., , и . Sci. China Inf. Sci., 59 (5): 050105:1-050105:3 (2016)A Secure, Usable, and Transparent Middleware for Permission Managers on Android., , , , , и . IEEE Trans. Dependable Secur. Comput., 14 (4): 350-362 (2017)