From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A new access control method for semantic web services based on security control center., , и . ICNC, стр. 3711-3714. IEEE, (2010)A Privacy Filtering and Processing Model in Cloud Computing., , , и . ISCID (1), стр. 182-187. IEEE, (2016)Application of Mobile Cloud Computing in Operational Command Training Simulation System., , и . CIT, стр. 532-535. IEEE Computer Society, (2012)Staged Method of Code Similarity Analysis for Firmware Vulnerability Detection., , , и . IEEE Access, (2019)SO-RTI: A new RTI based on web services., , , и . ICAL, стр. 321-326. IEEE, (2012)RFID technology in victory judgement of military exercises., , , и . ICAL, стр. 390-394. IEEE, (2012)An ArcObjects-based approach to rapid application development of GIS., , и . ICAL, стр. 411-414. IEEE, (2012)云计算环境下隐私数据的隐式攻击保护 (Privacy Protection from Implicit Attacks in Cloud Computing Environment)., , , и . 计算机科学, 43 (9): 184-187 (2016)Standard Model Establishment of TCM Syndrome Differentiation of Type 2 Diabetes Based on Data-Mining., , , и . ISDA, стр. 747-754. IEEE Computer Society, (2007)A Survey on Side-Channel Attacks of Strong PUF., , , и . ICAIS (2), том 12240 из Lecture Notes in Computer Science, стр. 74-85. Springer, (2020)