From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Intentionality and Agency in Security., , , , и . Security Protocols Workshop, том 11286 из Lecture Notes in Computer Science, стр. 114-125. Springer, (2018)Data Encryption Using Bio Molecular Information. International Journal on Cryptography and Information Security (IJCIS), 4 (3): 21-33 (сентября 2014)An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment., , , и . ITCC (1), стр. 112-117. IEEE Computer Society, (2004)Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation., , , и . SecureComm, стр. 243-248. IEEE, (2005)Visualdrives Forensic Tool., , , и . DeSE, стр. 107-111. IEEE, (2015)A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing., , и . CIT/IUCC/DASC/PICom, стр. 618-625. IEEE, (2015)Extending AOP Principles for the Description of Network Security Patterns., , и . Cyberpatterns, Springer, (2014)Monitoring connectivity in wireless sensor networks., , , и . ISCC, стр. 507-512. IEEE Computer Society, (2009)The challenges of secure and trustworthy service composition in the Future Internet., , и . SoSE, стр. 329-334. IEEE, (2011)A community-based social P2P network for sharing human life digital memories., , , , и . Trans. Emerg. Telecommun. Technol., (2020)