From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication., , , и . IACR Cryptology ePrint Archive, (2017)TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs., , , , и . CoRR, (2018)Context-sensitive user interfaces for semantic services., , , и . ACM Trans. Internet Techn., 11 (3): 14:1-14:27 (2012)Data Abstraction and Visualisation in Next Step: Experiences from a Government Services Delivery Trial., , и . BigData Congress, стр. 263-270. IEEE Computer Society, (2013)Behavior-Based Propagation of Trust in Social Networks with Restricted and Anonymous Participation., , и . Comput. Intell., 31 (4): 642-668 (2015)Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation., , и . CoRR, (2018)GhostKnight: Breaching Data Integrity via Speculative Execution., , , и . CoRR, (2020)What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text., , , , и . IEEE Trans. Serv. Comput., 13 (3): 584-596 (2020)Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps., , , , , , , и . ACM Trans. Cyber Phys. Syst., 3 (4): 36:1-36:21 (2019)A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage., и . Data Sci. Eng., 1 (3): 149-160 (2016)