From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A modified secure hash design to circumvent collision and length extension attacks., , и . J. Inf. Secur. Appl., (2022)Greening emerging IT technologies: techniques and practices., , , , , , , и . J. Internet Serv. Appl., 8 (1): 9:1-9:11 (2017)Elements of Cloud Adoption.. IEEE Cloud Comput., 1 (1): 71-73 (2014)EvacSys: A Cloud-Based Service for Emergency Evacuation., , , , и . IEEE Cloud Comput., 3 (1): 60-68 (2016)Security in cloud computing: Opportunities and challenges., , и . Inf. Sci., (2015)Self-adaptation and mutual adaptation for distributed scheduling in benevolent clouds., , , , , и . Concurr. Comput. Pract. Exp., (2017)Potentials, trends, and prospects in edge technologies: Fog, cloudlet, mobile edge, and micro data centers., , , и . Comput. Networks, (2018)Genetic algorithm in finding Pareto frontier of optimizing data transfer versus job execution in grids., , и . Concurr. Comput. Pract. Exp., 28 (6): 1715-1736 (2016)SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud., , , и . IEEE Trans. Cloud Comput., 9 (1): 347-359 (2021)On the Characterization of the Structural Robustness of Data Center Networks., , , , , и . IEEE Trans. Cloud Comput., (2013)