From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DSSH: Digital signature based secure handover for network-based mobility management., , и . Comput. Syst. Sci. Eng., (2012)A Framework for the User-Oriented Personal Information Protection., и . Security and Management, стр. 12-19. CSREA Press, (2006)Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters., , , , , и . IACR Cryptology ePrint Archive, (2015)An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency., , , , и . IACR Cryptology ePrint Archive, (2014)A new security middleware architecture based on fog computing and cloud to support IoT constrained devices., , и . IML, стр. 35:1-35:8. ACM, (2017)Cyberbullying detection using parent-child relationship between comments., , , и . iiWAS, стр. 325-334. ACM, (2016)Modeling and Containment of Search Worms Targeting Web Applications., и . DIMVA, том 6201 из Lecture Notes in Computer Science, стр. 183-199. Springer, (2010)Implementation of Efficient Operations over GF(232) Using Graphics Processing Units., , и . ICT-EurAsia, том 8407 из Lecture Notes in Computer Science, стр. 602-611. Springer, (2014)Single-Path Authenticated-Encryption Scheme Based on Universal Hashing., и . Selected Areas in Cryptography, том 2595 из Lecture Notes in Computer Science, стр. 94-109. Springer, (2002)A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks., , и . WISA, том 10144 из Lecture Notes in Computer Science, стр. 79-89. (2016)