From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Flexible query techniques for well-formed XML documents., и . KES, стр. 708-711. IEEE, (2000)Securing XML-based Multimedia Content., и . SEC, том 250 из IFIP Conference Proceedings, стр. 61-72. Kluwer, (2003)Using XML Similarity to Enhance SOAP Messages Security., и . International Conference on Internet Computing, стр. 260-265. CSREA Press, (2008)Risk-aware Collaborative Processes.. ENASE, стр. 3. INSTICC Press, (2009)Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks., , , и . ICCCS (1), том 10039 из Lecture Notes in Computer Science, стр. 456-467. (2016)iPrivacy: a Distributed Approach to Privacy on the Cloud., , и . CoRR, (2015)SAF: Strategic Alignment Framework for Monitoring Organizations., , , и . BIS, том 7 из Lecture Notes in Business Information Processing, стр. 213-226. Springer, (2008)Towards a Collaborative Innovation Catalyst., , , , и . SITIS, стр. 637-643. IEEE Computer Society, (2012)Assessing Separation of Duty Policies through the Interpretation of Sampled Video Sequences: A Pair Programming Case Study., , , и . New Directions in Intelligent Interactive Multimedia, том 142 из Studies in Computational Intelligence, Springer, (2008)Fuzzy techniques for software reuse., и . SAC, стр. 552-557. ACM, (1996)