From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Privacy-Preserving Processing Scheme for Location-Based Queries in Mobile Cloud., и . DSC, стр. 424-429. IEEE Computer Society, (2016)Non-repudiable Query Answer Authentication Scheme over Anonymous Cloud Data., , и . CBD, стр. 200-206. IEEE Computer Society, (2016)Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks., , , и . Int. J. Netw. Secur., 18 (5): 816-831 (2016)A Novel User Model Based on Searchable Encryption Scheme., , и . CBD, стр. 247-253. IEEE Computer Society, (2015)Flexibly and Securely Shape Your Data Disclosed to Others., , , , , и . AsiaCCS, стр. 160-167. ACM, (2019)ShortHC: Self-Regenerated Short Hash Chain for Resource-Constrained System., , , и . J. Inf. Hiding Multim. Signal Process., 8 (4): 847-860 (2017)Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data., и . Sensors, 16 (12): 1993 (2016)A Personalized Extended (a, k)-Anonymity Model., , и . CBD, стр. 234-240. IEEE Computer Society, (2015)An Empirical Investigation Into a Large-Scale Java Open Source Code Repository, , , , , , , , и . Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, стр. 11:1--11:10. (сентября 2010)Mixture of Experts Residual Learning for Hamming Hashing., , , , и . Neural Process. Lett., 55 (6): 7077-7093 (декабря 2023)