From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trusted military services based on the secure domain of the mobile security solution., , , и . ICTC, стр. 1125-1128. IEEE, (2015)A secure message service using the secure domain of a mobile security solution., , и . ICTC, стр. 619-620. IEEE, (2014)Secure user authentication based on the trusted platform for mobile devices., , и . EURASIP J. Wireless Comm. and Networking, (2016)Role-based policy distribution techniques in policy-based networks., , , и . Communications, Internet, and Information Technology, стр. 103-107. IASTED/ACTA Press, (2004)The Secure Urgent Situation Propagation System using the Mobile Security Solution., , и . CSCESM, стр. 109-114. IEEE, (2015)Secure voice communication service based on security platform for mobile devices., и . ICTC, стр. 1190-1192. IEEE, (2017)Mobile Security Solution for Sensitive Data Leakage Prevention., , и . ICCBN, стр. 59-64. ACM, (2017)Secure mobile device management based on domain separation., , и . ICTC, стр. 918-920. IEEE, (2016)Design of a LDAP Schema Based on Network Security Policy Information Model for Storing Security Policy., , и . Security and Management, стр. 373-377. CSREA Press, (2003)Design and Implementation of Policy Decision Point in Policy-Based Network., , и . ACIS-ICIS, стр. 534-538. IEEE Computer Society, (2005)