From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trustworthy Privacy Policy Translation in Untrusted IoT Environments., , , и . IoTBDS, стр. 132-143. SciTePress, (2018)DataVault: secure mobile access and data sharing., , , и . Netw. Secur., 2011 (5): 16-19 (2011)Obscure: Information-Theoretic Oblivious and Verifiable Aggregation Queries., , , , , и . Proc. VLDB Endow., 12 (9): 1030-1043 (2019)MIDE: Accuracy Aware Minimally Invasive Data Exploration For Decision Support., , , и . Proc. VLDB Endow., 15 (11): 2653-2665 (2022)CANOPY: A Verifiable Privacy-Preserving Token Ring-Based Communication Protocol for Smart Homes., , , , и . ACM Trans. Cyber Phys. Syst., 5 (1): 3:1-3:34 (2021)Exploiting Data Sensitivity on Partitioned Data., , и . From Database to Cyber Security, том 11170 из Lecture Notes in Computer Science, стр. 274-299. Springer, (2018)Ensuring Transaction Atomicity in Multidatabase Systems., , , , и . PODS, стр. 164-175. ACM Press, (1992)On Correctness of Non-serializable Executions., , , , и . PODS, стр. 97-108. ACM Press, (1993)Browsing and retrieving video content in a unified framework., , и . MMSP, стр. 9-14. IEEE, (1998)Towards Reliable Application Data Broadcast in Wireless Ad Hoc Networks., , , , и . WCNC, стр. 4063-4068. IEEE, (2007)