From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Evolutionary Risk-based Access Control Framework for Enterprise File Systems., , , , , и . WF-IoT, стр. 1-6. IEEE, (2022)On Derived Data Services in the Cyberspace., и . WWW (Posters), (2003)On Design and Implementation a Smart Contract-Based Investigation Report Management Framework for Smartphone Applications., , , , , и . IIH-MSP (2), том 82 из Smart Innovation, Systems and Technologies, стр. 282-289. Springer, (2017)Take Risks into Consideration while Job Dispatching., , , , , и . MOBIS, том 191 из IFIP, стр. 1-14. Springer, (2005)An ISO/IEC 15408-2 Compliant Security Auditing System with Blockchain Technology., и . CNS, стр. 1-2. IEEE, (2018)Ensuring the integrity and non-repudiation of remitting e-invoices in conventional channels with commercially available NFC devices., , , , , и . SNPD, стр. 1-6. IEEE Computer Society, (2014)On Privacy-Preserving E-Invoicing in Physical Channels via NFC., , и . RFIDSec Asia, том 12 из Cryptology and Information Security Series, стр. 29-40. IOS Press, (2014)Process-Oriented Approach for Validating Asset Value for Evaluating Information Security Risk., , и . CSE (3), стр. 379-385. IEEE Computer Society, (2009)Efficient Consistency Achievement of Federated Identity and Access Management Based on a Novel Self-Adaptable Approach., и . IEICE Trans. Inf. Syst., 95-D (2): 577-587 (2012)A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things., , , и . IEEE Access, (2018)