From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Gathering and Analyzing Identity Leaks for Security Awareness., , , , и . PASSWORDS, том 9393 из Lecture Notes in Computer Science, стр. 102-115. Springer, (2014)More Lightweight, yet Stronger 802.15.4 Security Through an Intra-layer Optimization., , и . FPS, том 10723 из Lecture Notes in Computer Science, стр. 173-188. Springer, (2017)Unified Cloud Access Control Model for Cloud Storage Broker., , , , и . ICOIN, стр. 60-65. IEEE, (2019)Unified logging system for monitoring multiple cloud storage providers in cloud storage broker., , , , и . ICOIN, стр. 44-49. IEEE, (2018)Secure Deduplication on Public Cloud Storage., , , и . ICBDC, стр. 34-41. ACM, (2019)Denial-of-Sleep-Resilient Session Key Establishment for IEEE 802.15.4 Security: From Adaptive to Responsive., , и . EWSN, стр. 25-36. Junction Publishing, Canada/ ACM, (2018)Countering Three Denial-of-Sleep Attacks on ContikiMAC., , и . EWSN, стр. 108-119. Junction Publishing, Canada / ACM, (2017)Automated parsing and interpretation of identity leaks., , , и . Conf. Computing Frontiers, стр. 127-134. ACM, (2016)Supporting Internet-Based Location for Location-Based Access Control in Enterprise Cloud Storage Solution., , , , , и . AINA, том 926 из Advances in Intelligent Systems and Computing, стр. 1240-1253. Springer, (2019)Secure and Scalable Multi-Company Management in Enterprise Cloud Storage Broker System., , , , , и . ISPA/BDCloud/SocialCom/SustainCom, стр. 847-856. IEEE, (2019)