From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deep-Confidentiality: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data., , , , , и . ACM Trans. Internet Techn., 22 (2): 42:1-42:21 (2022)Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions., , , и . Comput. Networks, (2019)Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach., , , и . IEEE Trans. Engineering Management, 67 (4): 1244-1255 (2020)Formal verification and complexity analysis of confidentiality aware textual clinical documents framework., , , , , и . Int. J. Intell. Syst., 37 (12): 10380-10399 (декабря 2022)(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility., , , , , , , и . Trans. Emerg. Telecommun. Technol., (2022)Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud., , , , , , , , и . Int. J. Distributed Sens. Networks, (2019)Secure Logging as a Service Using Reversible Watermarking., , , , и . FNC/MobiSPC, том 110 из Procedia Computer Science, стр. 336-343. Elsevier, (2017)Adaptive Grouping and Pseudonym Changing Policy for Protection of Vehicles Location Information in VANETs., , и . SSCI, стр. 1-7. IEEE, (2021)Data trustworthiness in IoT., , , , , и . ICOIN, стр. 414-419. IEEE, (2018)Using CycleGANs to Generate Realistic STEM Images for Machine Learning., , , и . CoRR, (2023)