From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An efficient dynamic-identity based signature scheme for secure network coding., , , , и . Comput. Networks, 54 (1): 28-40 (2010)A novel design for content delivery over software defined mobile social networks., , , и . IEEE Netw., 29 (4): 62-67 (2015)Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing., , , , , и . ICDCS, стр. 470-480. IEEE, (2022)An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts., , , и . IEEE BigData, стр. 5937-5944. IEEE, (2019)GB-IDS: An Intrusion Detection System for CAN Bus Based on Graph Analysis., , , , , и . ICCC, стр. 1-6. IEEE, (2023)Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter., , , , , , и . WASA, том 10251 из Lecture Notes in Computer Science, стр. 124-135. Springer, (2017)A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs., , и . ICC, стр. 1-5. IEEE, (2011)How to Construct Interval Encryption from Binary Tree Encryption., , , , , и . ACNS, том 6123 из Lecture Notes in Computer Science, стр. 19-34. (2010)Secure Localized Authentication and Billing for Wireless Mesh Networks., , , , и . GLOBECOM, стр. 486-491. IEEE, (2007)Sybil-aware least cost rumor blocking in social networks., , и . GLOBECOM, стр. 692-697. IEEE, (2014)