From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security issues in MANET: A review., , и . WOCN, стр. 1-4. IEEE, (2010)Secure Multi-Party Computation for statistical computations using virtual parties on a Token Ring Network., , , и . WOCN, стр. 1-6. IEEE, (2010)A BigData approach for sentiment analysis of twitter data using Naive Bayes and SVM Algorithm., , и . WOCN, стр. 1-6. IEEE, (2019)Key Issues of Security and Integrity in Third Party Association Rule Mining., , , и . ICETET, стр. 337-340. IEEE Computer Society, (2009)Strategic Game theory models and commercialization for Nano RFID systems., , , и . WOCN, стр. 1-5. IEEE, (2010)Simulation of Collision Resistant Secure Sum Protocol., , и . CoRR, (2014)Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation, , и . CoRR, (2010)A Method for Load Balancing and Energy Optimization in Cloud Computing Virtual Machine Scheduling., , и . UKCI, том 1453 из Advances in Intelligent Systems and Computing, стр. 325-335. Springer, (2023)Congestion Control during Data Privacy in Secure Multiparty Computation., , , , и . ICETET, стр. 330-332. IEEE Computer Society, (2009)Electronic Data Interchange: A Review., , , и . CICSyN, стр. 323-327. IEEE Computer Society, (2011)