The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Vladimir A. Oleshchuk: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Vladimir A. Oleshchuk
    On Public-Key Cryptosystem Based on Church-Rosser String-Rewriting Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    COCOON, 1995, pp:264-269 [Conf]
  2. Vladimir A. Oleshchuk, Asle Pedersen
    Ontology Based Semantic Similarity Comparison of Documents. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:735-738 [Conf]
  3. A. V. Anisimov, Vladimir A. Oleshchuk
    Stable Finite Automata Mappings and Church-Rosser Systems. [Citation Graph (0, 0)][DBLP]
    FCT, 1987, pp:30-33 [Conf]
  4. Vladimir A. Oleshchuk
    Church-Rosser Codes. [Citation Graph (0, 0)][DBLP]
    IMA Conf., 1995, pp:199-204 [Conf]
  5. Frode Hansen, Vladimir A. Oleshchuk
    Conformance Checking of RBAC Policy and its Implementation. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:144-155 [Conf]
  6. Frode Hansen, Vladimir A. Oleshchuk
    Location-based Security Framework for use of Handheld Devices in Medical Information Systems. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2006, pp:565-569 [Conf]
  7. Geir M. Køien, Vladimir A. Oleshchuk
    Location Privacy for Cellular Systems; Analysis and Solution. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:40-58 [Conf]
  8. Vladimir A. Oleshchuk
    Privacy Preserving Monitoring and Surveillance in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2007, pp:485-492 [Conf]

  9. Secure Team-Based EPR Access Acquisition in Wireless Networks. [Citation Graph (, )][DBLP]


  10. Secure Group Communication Using Fractional Public Keys. [Citation Graph (, )][DBLP]


  11. Semantic Retrieval of Text Documents. [Citation Graph (, )][DBLP]


  12. Privacy Violation Classification of Snort Ruleset. [Citation Graph (, )][DBLP]


  13. The Design of Secure and Efficient P2PSIP Communication Systems. [Citation Graph (, )][DBLP]


  14. EPR Access Authorization of Medical Teams Based on Patient Consent. [Citation Graph (, )][DBLP]


  15. Anonymity Preserving Authorization Granting in Medical Information Networks. [Citation Graph (, )][DBLP]


  16. Hierarchical Multi-Party Key Agreement for Wireless Networks. [Citation Graph (, )][DBLP]


  17. Efficient Hierarchical Group-Oriented Key Establishment and Decryption. [Citation Graph (, )][DBLP]


  18. A secure architecture for P2PSIP-based communication systems. [Citation Graph (, )][DBLP]


  19. Secure and Efficient Data Storage in Unattended Wireless Sensor Networks. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002