From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Automated Negotiation Engine for Consistency of Access Policies in Grid., , и . GCC, стр. 589-595. IEEE Computer Society, (2008)A Grid Access Control Model Based on Dynamic Negotiating., , и . GCC, стр. 408-412. IEEE Computer Society, (2006)A Community Authorization Mechanism Research Based on RBAC in Data Grid., , и . GCA, стр. 210-216. CSREA Press, (2005)An Authorization Mechanism Based on Privilege Negotiation Policy in Grid., , , и . HPCC, стр. 720-727. IEEE Computer Society, (2008)A Task Scheduling Algorithm based on QoS-Driven in Cloud Computing., , , , и . ITQM, том 17 из Procedia Computer Science, стр. 1162-1169. Elsevier, (2013)Impossible Differential Cryptanalysis of BORON., , , , и . J. Inf. Sci. Eng., 38 (4): 805-819 (2022)Impossible Differential Cryptanalysis on ESF Algorithm with Simplified MILP Model., , , , , и . KSII Trans. Internet Inf. Syst., 15 (10): 3815-3833 (2021)Differential Cryptanalysis of TweGIFT-128 Based on Neural Network., , , , , и . DSC, стр. 529-534. IEEE, (2021)A Trust Evaluation Model for Cloud Computing., , , и . ITQM, том 17 из Procedia Computer Science, стр. 1170-1177. Elsevier, (2013)