From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A secure cloud-edges computing architecture for metagenomics analysis., , , , , , и . Future Gener. Comput. Syst., (2020)CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices., , , , , и . ACM Trans. Cyber Phys. Syst., 4 (3): 34:1-34:19 (2020)Enabling BYOD through secure meta-market., , , и . WISEC, стр. 219-230. ACM, (2014)2GesturePIN: Securing PIN-Based Authentication on Smartwatches., , , и . WETICE, стр. 327-333. IEEE, (2019)Towards Policy-Driven Monitoring of Fog Applications., , и . WETICE, стр. 93-97. IEEE, (2019)Trusted host-based card emulation., , и . HPCS, стр. 221-228. IEEE, (2015)Securing PIN-based authentication in smartwatches with just two gestures., , , , и . Concurr. Comput. Pract. Exp., (2020)MobHide: App-Level Runtime Data Anonymization on Mobile., , и . ACNS Workshops, том 12418 из Lecture Notes in Computer Science, стр. 490-507. Springer, (2020)Are you (Google) Home? Detecting Users' Presence through Traffic Analysis of Smart Speakers., , , , и . ITASEC, том 2597 из CEUR Workshop Proceedings, стр. 105-118. CEUR-WS.org, (2020)AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems., , , и . AINA Workshops, том 1150 из Advances in Intelligent Systems and Computing, стр. 867-876. Springer, (2020)