From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Leveraging Quiz-based Multiple-prize Web Tournaments for Reinforcing Routine Mathematical Skills., , , и . J. Educ. Technol. Soc., 16 (3): 28-43 (2013)Privacy Models in Wireless Sensor Networks: A Survey., , и . J. Sensors, (2016)PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things., , , , и . J. Netw. Comput. Appl., (2016)Design recommendations for online cybersecurity courses., и . Comput. Secur., (2019)Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities., , , и . Pers. Ubiquitous Comput., 21 (5): 869-891 (2017)Zephyrus: An Information Hiding Mechanism Leveraging Ethereum Data Fields., , , и . IEEE Access, (2021)Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors., , и . Sensors, 18 (4): 1219 (2018)AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps., , и . TrustCom, стр. 370-379. IEEE Computer Society, (2014)Security Protocols for Networks and Internet: A Global Vision., , и . Computer and Network Security Essentials, Springer, (2018)L-PEP: A Logic to Reason about Privacy-Enhancing Cryptography Protocols., , , и . DPM/SETOP, том 6514 из Lecture Notes in Computer Science, стр. 108-122. Springer, (2010)