From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Preventing velocity-based linkage attacks in location-aware applications., , , и . GIS, стр. 246-255. ACM, (2009)A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations., , и . DEXA (1), том 6261 из Lecture Notes in Computer Science, стр. 368-384. Springer, (2010)TRBAC: a temporal role-based access control model., , и . ACM Workshop on Role-Based Access Control, стр. 21-30. ACM, (2000)An infrastructure for managing secure update operations on XML data., , , и . SACMAT, стр. 110-122. ACM, (2003)Supporting Delegation in Secure Workflow Management Systems., , , и . DBSec, том 142 из IFIP, стр. 190-202. Kluwer/Springer, (2003)Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation., , , и . TrustCom/BigDataSE/ISPA (1), стр. 718-725. IEEE, (2015)Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices., , , и . IEEE Trans. Mob. Comput., 17 (4): 927-944 (2018)Context-Dependent Authentication and Access Control., и . iNetSeC, том 309 из IFIP Advances in Information and Communication Technology, стр. 63-75. Springer, (2009)Distributed Database Design Using the Entity-Relationship Model.. ER, стр. 189-203. North-Holland, (1983)Network Policy Enforcement Using Transactions: The NEUTRON Approach., и . SACMAT, стр. 129-136. ACM, (2018)