From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities., , и . PST, стр. 219-223. (2004)A Real-Time Node-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks., и . Systems Communications, стр. 422-427. IEEE Computer Society, (2005)Secure image data deduplication through compressive sensing., и . PST, стр. 569-572. IEEE, (2016)An IoT trust and reputation model based on recommender systems., и . PST, стр. 561-568. IEEE, (2016)On efficient decoding for the Fuzzy Vault scheme., и . ISSPA, стр. 454-459. IEEE, (2012)New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields., и . Public Key Cryptography, том 4939 из Lecture Notes in Computer Science, стр. 229-247. Springer, (2008)Securing Harari's Authentication Scheme., и . Int. J. Netw. Secur., 14 (4): 206-210 (2012)An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control., , и . IWAP, том 128 из Frontiers in Artificial Intelligence and Applications, стр. 139-154. IOS Press, (2005)End-to-end QoS mapping and aggregation for selecting cloud services., , , и . CTS, стр. 515-522. IEEE, (2014)Lightweight mutual RFID authentication., и . ICC, стр. 868-872. IEEE, (2012)