From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Forward Privacy Analysis of a Dynamic Searchable Encryption Scheme., , , и . ICGEC, том 1107 из Advances in Intelligent Systems and Computing, стр. 474-480. Springer, (2019)Data storage security for the Internet of Things., , , и . J. Supercomput., 76 (11): 8529-8547 (2020)A Survey on the Application of Generative Adversarial Networks in Cybersecurity: Prospective, Direction and Open Research Scopes., , , , и . CoRR, (2024)A Probabilistic Homomorphic Encryption Algorithm over Integers - Protecting Data Privacy in Clouds.. UIC/ATC/ScalCom, стр. 653-656. IEEE Computer Society, (2015)Interdomain Access Control with Policy Routing., , и . FTDCS, стр. 46-52. IEEE Computer Society, (1997)A Dynamic Interdomain Communication Path Setup in Active Network., , и . IWAN, том 1653 из Lecture Notes in Computer Science, стр. 274-284. Springer, (1999)Ensuring Query Completeness in Outsourced Database Using Order-Preserving Encryption., , , , и . ISPA/BDCloud/SocialCom/SustainCom, стр. 776-783. IEEE, (2019)P2P email encryption by an identity-based one-way group key agreement protocol., , и . ICPADS, стр. 760-767. IEEE Computer Society, (2014)Unveiling the Efficacy of BERT's Attention in Memory Obfuscated Malware Detection., , и . ISPEC, том 15053 из Lecture Notes in Computer Science, стр. 273-291. Springer, (2024)An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription.. CIKM, стр. 285-286. ACM, (2005)