From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems., и . SECURWARE, стр. 31-36. IEEE Computer Society, (2009)Access control aware data retrieval for secret sharing based database outsourcing., , и . Distributed Parallel Databases, 34 (4): 505-534 (2016)Access control enforcement on outsourced data ensuring privacy of access control policies., , и . HPCS, стр. 491-497. IEEE, (2011)Cooperative security administration in multi-security-domain environments using a variant of deontic logic., , , и . Sci. Iran., 19 (3): 635-653 (2012)DSCA: an inline and adaptive application identification approach in encrypted network traffic., , и . ICCSP, стр. 39-43. ACM, (2019)k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing., , и . DBSec, том 7371 из Lecture Notes in Computer Science, стр. 263-273. Springer, (2012)Security Enhancement for a Low Computation Cost User Authentication Scheme., , и . SECRYPT, стр. 5-8. INSTICC Press, (2006)An Access Control Framework for Pervasive Computing Environments., , и . PSC, стр. 97-103. CSREA Press, (2006)Multi-User Dynamic Searchable Symmetric Encryption with Corrupted Participants., , , , и . IACR Cryptol. ePrint Arch., (2022)An Architecture for a Context-aware Service Broker in Ubiquitous Computing Environments., , и . AICCSA, стр. 1097-1100. IEEE Computer Society, (2006)