From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Zephyrus: An Information Hiding Mechanism Leveraging Ethereum Data Fields., , , и . IEEE Access, (2021)Leveraging Quiz-based Multiple-prize Web Tournaments for Reinforcing Routine Mathematical Skills., , , и . J. Educ. Technol. Soc., 16 (3): 28-43 (2013)Privacy Models in Wireless Sensor Networks: A Survey., , и . J. Sensors, (2016)Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities., , , и . Pers. Ubiquitous Comput., 21 (5): 869-891 (2017)PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things., , , , и . J. Netw. Comput. Appl., (2016)Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors., , и . Sensors, 18 (4): 1219 (2018)Design recommendations for online cybersecurity courses., и . Comput. Secur., (2019)AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps., , и . TrustCom, стр. 370-379. IEEE Computer Society, (2014)User-Managed Access Control in Web Based Social Networks., , , и . Security and Privacy Preserving in Social Networks, Springer, (2013)Automatic Rule Generation Based on Genetic Programming for Event Correlation., , , , и . CISIS, том 63 из Advances in Intelligent and Soft Computing, стр. 127-134. Springer, (2009)