From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing., , , , и . Future Gener. Comput. Syst., (2018)Antitampering Scheme of Evidence Transfer Information in Judicial System Based on Blockchain., , , , , , и . Secur. Commun. Networks, (2022)SADUS: Secure data deletion in user space for mobile devices., , , и . Comput. Secur., (2018)Selfholding: A combined attack model using selfish mining with block withholding attack., , , , , и . Comput. Secur., (2019)APPLET: a privacy-preserving framework for location-aware recommender system., , , , , , и . Sci. China Inf. Sci., 60 (9): 92101 (2017)Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing., , , , и . Sci. China Inf. Sci., 60 (5): 52103:1-52103:17 (2017)CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases., , , , , , и . IEEE J. Sel. Areas Commun., 40 (11): 3191-3206 (2022)Multi-domain Direct Anonymous Attestation Scheme from Pairings., , , и . NSS, том 8792 из Lecture Notes in Computer Science, стр. 566-573. Springer, (2014)Modeling Malicious Code Spread in Scale-Free Networks of Moving Agents., , , и . CSSE (3), стр. 546-549. IEEE Computer Society, (2008)978-0-7695-3336-0.Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction., , и . IEEE BigData, стр. 1381-1388. IEEE, (2019)