From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multi-route query processing and optimization., , , , и . J. Comput. Syst. Sci., 79 (3): 312-329 (2013)Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases., , и . IEEE Trans. Knowl. Data Eng., 8 (5): 839-854 (1996)PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols., , , , , , и . CoRR, (2020)Detecting mobile malware threats to homeland security through static analysis., , , , и . J. Netw. Comput. Appl., (2014)MIST 2017: 9th International Workshop on Managing Insider Security Threats., и . CCS, стр. 2635-2636. ACM, (2017)D-algebra for composing access control policy decisions., , и . AsiaCCS, стр. 298-309. ACM, (2009)Optimal Placement of Security Resources for the Internet of Things., , , и . The Internet of Things for Smart Urban Ecosystems, Springer, (2019)IdentiDroid: Android can finally Wear its Anonymous Suit., , , и . Trans. Data Priv., 7 (1): 27-50 (2014)Foreword for the special issue of selected papers from the 1st ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS., и . Trans. Data Priv., 2 (1): 1-2 (2009)A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks., , , и . IEEE Trans. Dependable Secur. Comput., 12 (3): 256-269 (2015)