From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies., , , и . ICICS, том 4861 из Lecture Notes in Computer Science, стр. 386-397. Springer, (2007)Opinion Dynamics in the Presence of Increasing Agreement Pressure., , , и . IEEE Trans. Cybern., 49 (4): 1270-1278 (2019)The relativity of privacy preservation based on social tagging., , , , и . Inf. Sci., (2014)XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks., и . DBSec, том 7371 из Lecture Notes in Computer Science, стр. 223-238. Springer, (2012)Data protection models for service provisioning in the cloud., и . SACMAT, стр. 183-192. ACM, (2010)Privacy policies compliance across digital identity management systems., , и . SPRINGL, стр. 72-81. ACM, (2008)Incentivizing Distributive Fairness for Crowdsourcing Workers., , и . AAMAS, стр. 404-412. International Foundation for Autonomous Agents and Multiagent Systems, (2019)Trust-Chi: An XML Framework for Trust Negotiations., , и . Communications and Multimedia Security, том 2828 из Lecture Notes in Computer Science, стр. 146-157. Springer, (2003)A Cloud Brokerage Architecture for Efficient Cloud Service Selection., , , и . IEEE Trans. Serv. Comput., 12 (1): 144-157 (2019)Twitter Mining for Disaster Response: A Domain Adaptation Approach., , , , , , , и . ISCRAM, ISCRAM Association, (2015)