From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PP-trust-X: A system for privacy preserving trust negotiations., , , , и . ACM Trans. Inf. Syst. Secur., 10 (3): 12 (2007)Specification and enforcement of flexible security policy for active cooperation., , , , и . Inf. Sci., 179 (15): 2629-2642 (2009)Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases., , и . IEEE Trans. Knowl. Data Eng., 8 (5): 839-854 (1996)Multi-route query processing and optimization., , , , и . J. Comput. Syst. Sci., 79 (3): 312-329 (2013)PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols., , , , , , и . CoRR, (2020)Detecting mobile malware threats to homeland security through static analysis., , , , и . J. Netw. Comput. Appl., (2014)Effective Key Management in Dynamic Wireless Sensor Networks., , , и . IEEE Trans. Inf. Forensics Secur., 10 (2): 371-383 (2015)IdentiDroid: Android can finally Wear its Anonymous Suit., , , и . Trans. Data Priv., 7 (1): 27-50 (2014)Foreword for the special issue of selected papers from the 1st ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS., и . Trans. Data Priv., 2 (1): 1-2 (2009)MIST 2017: 9th International Workshop on Managing Insider Security Threats., и . CCS, стр. 2635-2636. ACM, (2017)