From post

Design and Implementation of a Secure Prototype for EPCglobal Network Services.

, , , и . RFIDSec Asia, том 8 из Cryptology and Information Security Series, стр. 45-56. IOS Press, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Prior-free rare category detection: More effective and efficient solutions., , , , и . Expert Syst. Appl., 41 (17): 7691-7706 (2014)X-Region: A framework for location privacy preservation in mobile peer-to-peer networks., , , и . Int. J. Commun. Syst., 28 (1): 167-186 (2015)AAGA: Affinity-Aware Grouping for Allocation of Virtual Machines., , , , и . AINA, стр. 235-242. IEEE Computer Society, (2013)Spatial co-location pattern discovery without thresholds., , , и . Knowl. Inf. Syst., 33 (2): 419-445 (2012)Browse with a social web directory., , , , , и . SIGIR, стр. 865-868. ACM, (2013)Rare Category Exploration on Linear Time Complexity., , , , и . DASFAA (2), том 9050 из Lecture Notes in Computer Science, стр. 37-54. Springer, (2015)CLOVER: a faster prior-free approach to rare-category detection., , , , и . Knowl. Inf. Syst., 35 (3): 713-736 (2013)Recovering Missing Labels of Crowdsourcing Workers., , , и . SDM, стр. 857-865. SIAM, (2014)Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data., , , и . Privacy in Statistical Databases, том 6344 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2010)Rare Category Detection Forest., , , и . KSEM, том 9403 из Lecture Notes in Computer Science, стр. 612-618. Springer, (2015)