From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improvised Model for Blockchain in Distributed Cloud Environment., , , , , и . CSS, том 13547 из Lecture Notes in Computer Science, стр. 327-341. Springer, (2022)Partition ORAMS Combined with Novel Client Eviction Mechanism., , и . CSE/EUC (1), стр. 525-530. IEEE Computer Society, (2017)Identifying Windows Installer Package Files for Detection of Pirated Software., , , , , и . IMIS, стр. 287-290. IEEE Computer Society, (2014)Security of 5G-V2X: Technologies, Standardization and Research Directions., , и . CoRR, (2019)Editorial.. JoWUA, 1 (1): 1-2 (2010)A Multiple-Key Management Scheme in Wireless Sensor Networks., , , , , , и . CD-ARES Workshops, том 8128 из Lecture Notes in Computer Science, стр. 337-344. Springer, (2013)A Structure P2P Based Web Services Registry with Access and Control., , , , и . CD-ARES, том 8708 из Lecture Notes in Computer Science, стр. 286-297. Springer, (2014)A Design of Web Log Integration Framework Using NoSQL., , , , и . ICT-EurAsia, том 8407 из Lecture Notes in Computer Science, стр. 438-445. Springer, (2014)Random Cladding with Feedback Mechanism for encrypting mobile messages., , , , , и . INFOCOM Workshops, стр. 970-975. IEEE, (2016)Prosperity of IT security technologies in homeland defense., , и . J. Ambient Intell. Humaniz. Comput., 5 (2): 169-171 (2014)