From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Reinforced Dynamic Multi-keyword Ranked Search with Forward Privacy., , , , , и . DSC, стр. 1-8. IEEE, (2021)Using Poisson Distribution to Enhance CNN-based NB-IoT LDoS Attack Detection., , , , , и . DSC, стр. 1-7. IEEE, (2022)Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls., , , , , и . BDTA, том 555 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 79-94. Springer, (2023)An Efficient Resource Allocation Framework for Cloud Federations.. Inf. Technol. Control., 44 (1): 64-76 (2015)Efficient access control with traceability and user revocation in IoT., , , , и . Multim. Tools Appl., 80 (20): 31487-31508 (2021)An Authentication Scheme for Ubiquitous RFID Systems., , и . RFIDSec Asia, том 12 из Cryptology and Information Security Series, стр. 41-50. IOS Press, (2014)A fraud detection system for real-time messaging communication on Android Facebook messenger., , , и . GCCE, стр. 361-363. IEEE, (2015)Special issue on security and privacy of blockchain technologies., , , , и . Int. J. Inf. Sec., 19 (3): 243-244 (2020)CE-TIP: A Code Expansion Based Tag Identification Protocol for RFID Systems., , и . J. Inf. Sci. Eng., 27 (2): 777-788 (2011)Designing a Mobile Payment-Driven Mobility-as-a-Service Architecture for Bus Transportation., , и . KES, том 225 из Procedia Computer Science, стр. 4814-4823. Elsevier, (2023)