From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Effective Storage Security in Incompletely Trusted Environment., и . AINA Workshops (1), стр. 432-437. IEEE Computer Society, (2007)Flooding Attack on the Binding Cache in Mobile IPv6., и . ICETE (Selected Papers), том 3 из Communications in Computer and Information Science, стр. 187-200. (2005)Distributed computational framework in TOTEM architecture enabled by blockchain., , и . ICCSE, стр. 83-88. IEEE, (2020)Intercloud for simulation federations., и . HPCS, стр. 397-404. IEEE, (2011)Applying SWRL-F to intercloud constraints analysis., и . HPCS, стр. 391-396. IEEE, (2011)Time Controlled Expressive Predicate Query With Accountable Anonymity., , , , , , и . IEEE Trans. Serv. Comput., 16 (2): 1444-1457 (марта 2023)On t-designs from codes over Z4., , и . Discret. Math., 238 (1-3): 67-80 (2001)New infinite families of 3-designs from preparata codes over Z4., , и . Discret. Math., 195 (1-3): 139-156 (1999)Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography., , и . CloudCom, том 5931 из Lecture Notes in Computer Science, стр. 167-177. Springer, (2009)Automatic Web Service Detection in Oil and Gas., , и . FGIT-FGCN, том 56 из Communications in Computer and Information Science, стр. 193-200. Springer, (2009)