From post

Multiparty Authorization Framework for Data Sharing in Online Social Networks.

, и . DBSec, том 6818 из Lecture Notes in Computer Science, стр. 29-43. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)., , и . IJDSN, 12 (1): 2965438:1-2965438:3 (2016)Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches., , , , , , , , , и . IEEE/ACM Trans. Netw., 29 (4): 1509-1526 (2021)Efficient construction of provably secure steganography under ordinary covert channels., , , , и . Sci. China Inf. Sci., 55 (7): 1639-1649 (2012)Secure and efficient random functions with variable-length output., , , , и . J. Netw. Comput. Appl., (2014)COVID-19 and Sinophobia: Detecting Warning Signs of Radicalization on Twitter and Reddit., , , , , и . Cyberpsychology Behav. Soc. Netw., 26 (7): 546-553 (июля 2023)Chain-of-Thought Prompting of Large Language Models for Discovering and Fixing Software Vulnerabilities., , , , , и . CoRR, (2024)On the Safety and Efficiency of Virtual Firewall Elasticity Control., , , , , , и . NDSS, The Internet Society, (2017)Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention., , , и . CoRR, (2017)Problematic Privacy Policies of Voice Assistant Applications., , , , и . IEEE Secur. Priv., 19 (6): 66-73 (2021)An Investigation of Large Language Models for Real-World Hate Speech Detection., , , , , , и . ICMLA, стр. 1568-1573. IEEE, (2023)