From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Securely sharing neuroimagery., , , , , и . CIKM, стр. 375-377. ACM, (2003)Efficient and secure keys management for wireless mobile communications., , и . POMC, стр. 66-73. ACM, (2002)Enforcing Subscription-Based Authorization Policies in Cloud Scenarios., , , и . DBSec, том 7371 из Lecture Notes in Computer Science, стр. 314-329. Springer, (2012)Numerical SQL Value Expressions Over Encrypted Cloud Databases., , и . DEXA (2), том 9262 из Lecture Notes in Computer Science, стр. 455-478. Springer, (2015)Privacy of data outsourced to a cloud for selected readers through client-side encryption., , и . WPES, стр. 171-176. ACM, (2011)Metrics suite for network attack graph analytics., и . CISR, стр. 5-8. ACM, (2014)Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification., , , и . STM, том 7783 из Lecture Notes in Computer Science, стр. 161-176. Springer, (2012)Integrity for distributed queries., , , , , и . CNS, стр. 364-372. IEEE, (2014)A New Polyinstantiation Integrity Constraint for Multilevel Relations., , и . CSFW, стр. 159-165. IEEE Computer Society, (1990)Disk storage isolation and verification in cloud., , , и . GLOBECOM, стр. 771-776. IEEE, (2012)