From post

Secure Anonymous Communications with Practical Anonymity Revocation Scheme.

, , и . IWSEC, том 4752 из Lecture Notes in Computer Science, стр. 352-364. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Risk assessment of BYOD: Bring your own device., , , , , и . GCCE, стр. 1-4. IEEE, (2016)Authentication method against shoulder-surfing attacks using secondary channel., и . ICCE, стр. 430-431. IEEE, (2015)Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era., , , , , и . NBiS, том 7 из Lecture Notes on Data Engineering and Communications Technologies, стр. 737-749. Springer, (2017)A File-Distribution Approach to Achieve High Availability and Confidentiality for Data Storage on Multi-cloud., , , и . COMPSAC Workshops, стр. 212-217. IEEE Computer Society, (2013)A Study of Risk Assessment for Sharing Economy based on a User's Viewpoint., , , и . GCCE, стр. 240-242. IEEE, (2019)Risk Assessment of Home Gateway/Smart Meter in Smart Grid Service., , , , , и . IIAI-AAI, стр. 1126-1131. IEEE Computer Society, (2016)A Study of Risk Assessment Quantification in Cloud Computing., , , , , , и . NBiS, стр. 426-431. IEEE Computer Society, (2014)Building a Security Aware Cloud by Extending Internal Control to Cloud., , и . ISADS, стр. 323-326. IEEE Computer Society, (2011)Service Matching and Collaboration for Electronic Commerce., , , , и . ISADS, стр. 169-175. IEEE Computer Society, (2001)Dynamic Analysis for Malware Detection Using API Calls and Memory Usage With Machine Learning Approach., , и . GCCE, стр. 475-477. IEEE, (2023)