From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Theory and methodology of research on cloud security., , и . Sci. China Inf. Sci., 59 (5): 050105:1-050105:3 (2016)A Secure, Usable, and Transparent Middleware for Permission Managers on Android., , , , , и . IEEE Trans. Dependable Secur. Comput., 14 (4): 350-362 (2017)RT-Grid: A QoS Oriented Service Grid Framework., , , и . PDCAT, том 3320 из Lecture Notes in Computer Science, стр. 345-348. Springer, (2004)Heterogeneous differential privacy for vertically partitioned databases., , , , и . Concurr. Comput. Pract. Exp., (2021)Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext., , , , , , и . IAS, стр. 73-78. IEEE, (2015)Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment., , , , , , и . IAS, стр. 61-66. IEEE, (2015)A Trusted Group Signature Architecture in Virtual Computing Environment., , , и . ATC, том 5060 из Lecture Notes in Computer Science, стр. 73-85. Springer, (2008)Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree., , , , , , и . ISSTA, стр. 89-100. ACM, (2023)A Scalable Service Scheme for Secure Group Communication in Grid., , , , и . COMPSAC (1), стр. 31-38. IEEE Computer Society, (2007)A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment., , , , и . UIC, том 5061 из Lecture Notes in Computer Science, стр. 35-45. Springer, (2008)