From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Trusted Group Signature Architecture in Virtual Computing Environment., , , и . ATC, том 5060 из Lecture Notes in Computer Science, стр. 73-85. Springer, (2008)Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree., , , , , , и . ISSTA, стр. 89-100. ACM, (2023)A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment., , , , и . UIC, том 5061 из Lecture Notes in Computer Science, стр. 35-45. Springer, (2008)A Novel VO-Based Access Control Model for Grid., , , и . GCC, том 3251 из Lecture Notes in Computer Science, стр. 293-300. Springer, (2004)TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection., , , , , и . ASE, стр. 109:1-109:12. ACM, (2022)Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment., , , и . IEEE Trans. Parallel Distributed Syst., 31 (3): 695-706 (2020)A Scalable Service Scheme for Secure Group Communication in Grid., , , , и . COMPSAC (1), стр. 31-38. IEEE Computer Society, (2007)Fully Context-Sensitive CFI for COTS Binaries., , , , , и . ACISP (2), том 10343 из Lecture Notes in Computer Science, стр. 435-442. Springer, (2017)A Secure High-Order Lanczos-Based Orthogonal Tensor SVD for Big Data Reduction in Cloud Environment., , , , и . IEEE Trans. Big Data, 5 (3): 355-367 (2019)CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers., , , , , и . WISEC, стр. 6:1-6:6. ACM, (2015)