From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure PUFs-Based Cipher Suite for Enabling TLS to Authenticate Hardware Devices., , и . AsiaCCS, стр. 675. ACM, (2015)Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family., , , и . AsiaCCS, стр. 895-900. ACM, (2016)ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks., , и . CCS, стр. 3662-3663. ACM, (2023)AutoMAP: Diagnose Your Microservice-based Web Applications Automatically., , , , , и . WWW, стр. 246-258. ACM / IW3C2, (2020)SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs., , , , , , , и . IEEE Trans. Comput. Social Systems, 6 (6): 1373-1385 (2019)Editorial: Special Issue on Security and Privacy of IoT., , и . World Wide Web, 21 (1): 1-6 (2018)Hardening Botnet by a Rational Botmaster., , и . Inscrypt, том 5487 из Lecture Notes in Computer Science, стр. 348-369. Springer, (2008)A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection., и . ISPEC, том 3439 из Lecture Notes in Computer Science, стр. 178-191. Springer, (2005)Practical network traffic analysis in P2P environment., , , , и . IWCMC, стр. 1801-1807. IEEE, (2011)An Efficient Admission Control Algorithm for Virtual Sensor Networks., , , и . HPCC/CSS/ICESS, стр. 735-742. IEEE, (2014)