From post

A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT.

, , , , , и . SecureComm (1), том 254 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 3-21. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning., , , , , и . ACSAC, стр. 647-657. ACM, (2022)Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking., , , , , , и . AsiaCCS, стр. 71-82. ACM, (2013)AugAuth: Shoulder-surfing resistant authentication for augmented reality., , , , , и . ICC, стр. 1-6. IEEE, (2017)Looks Good To Me: Authentication for Augmented Reality., , , и . TrustED@CCS, стр. 57-67. ACM, (2016)Optimal power allocation for achieving perfect secrecy capacity in MIMO wire-tap channels., , и . CISS, стр. 606-611. IEEE, (2009)On Multicast Throughput in Multihop MIMO Networks With Interference Alignment., , , , , , и . IEEE Trans. Veh. Technol., 67 (7): 6627-6641 (2018)MANDA: On Adversarial Example Detection for Network Intrusion Detection System., , , , и . INFOCOM, стр. 1-10. IEEE, (2021)A Survey of Distributed Consensus Protocols for Blockchain Networks., , , и . CoRR, (2019)Sparse Time-Frequency decomposition for multiple signals with same frequencies., и . CoRR, (2015)Memory Forensic Challenges Under Misused Architectural Features., , , , , и . IEEE Trans. Inf. Forensics Secur., 13 (9): 2345-2358 (2018)