From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multi-user Broadcast Authentication in Wireless Sensor Networks., , и . SECON, стр. 223-232. IEEE, (2007)Ensuring data storage security in Cloud Computing., , , и . IWQoS, стр. 1-9. IEEE, (2009)Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming., , и . IEEE Trans. Computers, 65 (1): 216-229 (2016)Anonymous ID-Based Group Key Agreement for Wireless Networks., , , и . WCNC, стр. 2615-2620. IEEE, (2008)Towards Privacy-Preserving Malware Detection Systems for Android., , , , и . ICPADS, стр. 545-552. IEEE, (2018)Fault-tolerant Event Boundary Detection in Wireless Sensor Networks., , и . GLOBECOM, IEEE, (2006)A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses., , , , , , , и . IEEE Commun. Surv. Tutorials, 24 (4): 2292-2328 (2022)Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices., , , , , и . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (2): 77:1-77:26 (2022)Task-aware Similarity Learning for Event-triggered Time Series., , , , и . CoRR, (2022)MsDroid: Identifying Malicious Snippets for Android Malware Detection., , , , , и . IEEE Trans. Dependable Secur. Comput., 20 (3): 2025-2039 (мая 2023)