From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Theory and methodology of research on cloud security., , и . Sci. China Inf. Sci., 59 (5): 050105:1-050105:3 (2016)A Secure, Usable, and Transparent Middleware for Permission Managers on Android., , , , , и . IEEE Trans. Dependable Secur. Comput., 14 (4): 350-362 (2017)RT-Grid: A QoS Oriented Service Grid Framework., , , и . PDCAT, том 3320 из Lecture Notes in Computer Science, стр. 345-348. Springer, (2004)Fully Context-Sensitive CFI for COTS Binaries., , , , , и . ACISP (2), том 10343 из Lecture Notes in Computer Science, стр. 435-442. Springer, (2017)CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers., , , , , и . WISEC, стр. 6:1-6:6. ACM, (2015)A Secure High-Order Lanczos-Based Orthogonal Tensor SVD for Big Data Reduction in Cloud Environment., , , , и . IEEE Trans. Big Data, 5 (3): 355-367 (2019)Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext., , , , , , и . IAS, стр. 73-78. IEEE, (2015)Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment., , , , , , и . IAS, стр. 61-66. IEEE, (2015)An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage., , , , , , и . BigDataSecurity/HPSC/IDS, стр. 412-417. IEEE, (2016)Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment., , , и . IEEE Trans. Parallel Distributed Syst., 31 (3): 695-706 (2020)