From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation., , и . ACM Trans. Inf. Syst. Secur., 17 (4): 14:1-14:37 (2015)Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage., , , и . IEEE Trans. Parallel Distributed Syst., 23 (12): 2231-2244 (2012)dbling: Identifying extensions installed on encrypted web thin clients., , , и . Digit. Investig., (2016)Role-based Access Control on the Web Using LDAP., , и . DBSec, том 215 из IFIP Conference Proceedings, стр. 19-30. Kluwer, (2001)Using X.509 Attribute Certificates for Role-Based EAM., , и . DBSec, том 256 из IFIP Conference Proceedings, стр. 49-60. Kluwer, (2002)SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments., , и . COMPSAC Workshops, стр. 393-398. IEEE Computer Society, (2010)Towards System Integrity Protection with Graph-Based Policy Analysis., , и . DBSec, том 5645 из Lecture Notes in Computer Science, стр. 65-80. Springer, (2009)Multiparty Authorization Framework for Data Sharing in Online Social Networks., и . DBSec, том 6818 из Lecture Notes in Computer Science, стр. 29-43. Springer, (2011)Information flow control in cloud computing., , , и . CollaborateCom, стр. 1-7. ICST / IEEE, (2010)Game theoretic analysis of multiparty access control in online social networks., , , и . SACMAT, стр. 93-102. ACM, (2014)