From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks., , , , , , и . Concurr. Comput. Pract. Exp., (2018)Corrigendum to "Private key agreement and secure communication for heterogeneous sensor networks" J. Parallel Distrib. Comput 70 (2010) 858-870., и . J. Parallel Distributed Comput., 70 (11): 1174 (2010)Secure timing synchronization for heterogeneous sensor network using pairing over elliptic curve., , и . Wirel. Commun. Mob. Comput., 10 (5): 662-671 (2010)Pairing-Based Secure Timing Synchronization for Heterogeneous Sensor Networks., , и . GLOBECOM, стр. 148-152. IEEE, (2008)Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks., , , , и . IEEE Trans. Ind. Informatics, 14 (2): 799-813 (2018)Privacy preserving secure data exchange in mobile P2P cloud healthcare environment., , , , , и . Peer-to-Peer Netw. Appl., 9 (5): 894-909 (2016)Identity and Pairing-Based Secure Key Management Scheme for Heterogeneous Sensor Networks., , и . WiMob, стр. 423-428. IEEE Computer Society, (2008)From sensing to alerting: a pathway of RESTstful messaging in ambient assisted living., , , , , и . IEEE Wirel. Commun., 23 (2): 102-110 (2016)A prediction system of Sybil attack in social network using deep-regression model., , , , и . Future Gener. Comput. Syst., (2018)Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks., , , , , и . Secur. Commun. Networks, 1 (2): 179-189 (2008)