From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Disk storage isolation and verification in cloud., , , и . GLOBECOM, стр. 771-776. IEEE, (2012)Privacy of data outsourced to a cloud for selected readers through client-side encryption., , и . WPES, стр. 171-176. ACM, (2011)Metrics suite for network attack graph analytics., и . CISR, стр. 5-8. ACM, (2014)Preventing Interval-Based Inference by Random Data Perturbation., , и . Privacy Enhancing Technologies, том 2482 из Lecture Notes in Computer Science, стр. 160-170. Springer, (2002)Universal and Representative Instances Using Unmarked Nulls.. FSTTCS, том 181 из Lecture Notes in Computer Science, стр. 367-378. Springer, (1984)Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast., , и . Networked Group Communication, том 2816 из Lecture Notes in Computer Science, стр. 107-118. Springer, (2003)An Authorization Model for a Distributed Hypertext System., , и . IEEE Trans. Knowl. Data Eng., 8 (4): 555-562 (1996)Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System., , , , и . CoRR, (2018)Incorporating Dynamic Constraints in the Flexible Authorization Framework., , и . ESORICS, том 3193 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2004)Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification., , , и . STM, том 7783 из Lecture Notes in Computer Science, стр. 161-176. Springer, (2012)