From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A role-based access in a hierarchical sensor network architecture to provide multilevel security., , и . Comput. Commun., 31 (4): 793-806 (2008)A Computational Dynamic Trust Model for User Authorization., , , и . IEEE Trans. Dependable Secur. Comput., 12 (1): 1-15 (2015)SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems., и . IEEE Trans. Dependable Secur. Comput., 10 (1): 14-27 (2013)Design of Intelligent Query Systems for Large Databases.. Pictorial Information Systems, том 80 из Lecture Notes in Computer Science, стр. 431-445. Springer, (1980)A Study of Communication Delays for Web Transactions.. Clust. Comput., 4 (4): 319-333 (2001)Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks., , , , , и . Workshop on Wireless Security, стр. 87-96. ACM, (2005)Key distribution and update for secure inter-group multicast communication., и . SASN, стр. 43-52. ACM, (2005)Authorization Based on Evidence and Trust., и . DaWaK, том 2454 из Lecture Notes in Computer Science, стр. 94-103. Springer, (2002)Transition From A Relation To Object Model Implementation., , , и . Advanced Database Systems, том 759 из Lecture Notes in Computer Science, стр. 87-103. Springer, (1993)Efficient Availability Mechanisms in Distributed Databases Systems., и . CIKM, стр. 645-654. ACM, (1993)