From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Greening emerging IT technologies: techniques and practices., , , , , , , и . J. Internet Serv. Appl., 8 (1): 9:1-9:11 (2017)A modified secure hash design to circumvent collision and length extension attacks., , и . J. Inf. Secur. Appl., (2022)Elements of Cloud Adoption.. IEEE Cloud Comput., 1 (1): 71-73 (2014)EvacSys: A Cloud-Based Service for Emergency Evacuation., , , , и . IEEE Cloud Comput., 3 (1): 60-68 (2016)A Reversible Watermarking Technique for Social Network Data Sets for Enabling Data Trust in Cyber, Physical, and Social Computing., , , и . IEEE Syst. J., 11 (1): 197-206 (2017)Modeling and Analysis of the Thermal Properties Exhibited by Cyberphysical Data Centers., , , , , и . IEEE Syst. J., 11 (1): 163-172 (2017)Designing and Modeling of Covert Channels in Operating Systems., , , , , и . IEEE Trans. Computers, 65 (6): 1706-1719 (2016)On the Characterization of the Structural Robustness of Data Center Networks., , , , , и . IEEE Trans. Cloud Comput., (2013)SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud., , , и . IEEE Trans. Cloud Comput., 9 (1): 347-359 (2021)Self-adaptation and mutual adaptation for distributed scheduling in benevolent clouds., , , , , и . Concurr. Comput. Pract. Exp., (2017)