From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Key management for multi-user encrypted databases., , , , , и . StorageSS, стр. 74-83. ACM, (2005)Encryption and Fragmentation for Data Confidentiality in the Cloud., , , , , и . FOSAD, том 8604 из Lecture Notes in Computer Science, стр. 212-243. Springer, (2013)Extending Loose Associations to Multiple Fragments., , , , , и . DBSec, том 7964 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2013)Privacy in Data Publishing., , и . DPM/SETOP, том 6514 из Lecture Notes in Computer Science, стр. 8-21. Springer, (2010)Supporting Concurrency in Private Data Outsourcing., , , , и . ESORICS, том 6879 из Lecture Notes in Computer Science, стр. 648-664. Springer, (2011)Access Control Models for XML., , , и . Handbook of Database Security, Springer, (2008)Selective Owner-side Encryption in Digital Data Markets: Strategies for Key Derivation., и . SECRYPT, стр. 620-627. SCITEPRESS, (2021)Privacy of Outsourced Data., и . PrimeLife, том 320 из IFIP Advances in Information and Communication Technology, стр. 174-187. Springer, (2009)Supporting privacy preferences in credential-based interactions., , , , и . WPES, стр. 83-92. ACM, (2010)Distributed Shuffle Index in the Cloud: Implementation and Evaluation., , , , , и . CSCloud, стр. 139-144. IEEE Computer Society, (2017)