From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Smart bracelets: Towards automating personal safety using wearable smart jewelry., и . CCNC, стр. 1-2. IEEE, (2018)Interaction provenance model for unified authentication factors in service oriented computing., и . CODASPY, стр. 127-130. ACM, (2014)A statistical analysis of disclosed storage security breaches., и . StorageSS, стр. 1-8. ACM, (2006)Introducing secure provenance: problems and challenges., , и . StorageSS, стр. 13-18. ACM, (2007)e-ESAS: Evolution of a participatory design-based solution for breast cancer (BC) patients in rural Bangladesh., , , , , , , , , и . Personal and Ubiquitous Computing, 19 (2): 395-413 (2015)The Life and Death of Unwanted Bits: Towards Proactive Waste Data Management in Digital Ecosystems, и . CoRR, (2011)Requirements of Secure Storage Systems for Healthcare Records., , и . Secure Data Management, том 4721 из Lecture Notes in Computer Science, стр. 174-180. Springer, (2007)Towards building a forensics aware language for secure logging., , и . Comput. Sci. Inf. Syst., 11 (4): 1291-1314 (2014)A Straightforward Author Profiling Approach in MapReduce., , , и . IBERAMIA, том 8864 из Lecture Notes in Computer Science, стр. 95-107. Springer, (2014)RoadNote: Automated Road Closure Detection using Urban Sensing., и . WF-IoT, стр. 1-6. IEEE, (2022)