Vladimir A. Oleshchuk
Orcid: 0000-0002-7905-1016Affiliations:
- University of Agder, Kristiansand, Norway
According to our database1,
Vladimir A. Oleshchuk
authored at least 85 papers
between 1987 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2023
A survey on blockchain envisioned attribute based access control for internet of things: Overview, comparative analysis, and open research challenges.
Comput. Networks, November, 2023
IEEE Trans. Serv. Comput., 2023
A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled Internet of Things.
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023
2020
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
2019
An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment.
ACM Trans. Internet Techn., 2019
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019
Proceedings of the New Trends in Databases and Information Systems, 2019
2018
Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health Environment.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
2017
Attribute based access control scheme with controlled access delegation for collaborative E-health environments.
J. Inf. Secur. Appl., 2017
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017
An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
2016
Soc. Netw. Anal. Min., 2016
Secur. Commun. Networks, 2016
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions.
Int. J. Inf. Manag., 2016
Proceedings of the 24th Euromicro International Conference on Parallel, 2016
A Novel Framework for Security Enforcement in Networks for Disaster and Crisis Management.
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016
Secure Multi-party Based Cloud Computing Framework for Statistical Data Analysis of Encrypted Data.
Proceedings of the 2016 conference on Innovations in Clouds, Internet and Networks, 2016
An attribute based access control scheme for secure sharing of electronic health records.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016
A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
2015
World Wide Web, 2015
Inf. Syst., 2015
An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the Codes, Cryptology, and Information Security, 2015
2014
IEEE Trans. Mob. Comput., 2014
An improvement of the batch-authentication and key agreement framework for P2P-based online social networks.
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014
2013
Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs.
Comput. Commun., 2013
Proceedings of the 11th IEEE International Conference on Industrial Informatics, 2013
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Addressing the Terms-of-Service Threat - Client-side Security and Policy Control for Free File Storage Services.
Proceedings of the CLOSER 2013, 2013
2012
Comput. Stand. Interfaces, 2012
FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012
An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012
Proceedings of the 6th IEEE International Conference on Intelligent Systems, 2012
Proceedings of the 1st International IEEE Symposium on Wireless Systems, 2012
2011
Wirel. Pers. Commun., 2011
Wirel. Pers. Commun., 2011
Semantic retrieval: an approach to representing, searching and summarising text documents.
Int. J. Inf. Technol. Commun. Convergence, 2011
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011
A Cognitive-based scheme for user reliability and expertise assessment in Q&A social networks.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011
Collaborative assessment of information provider's reliability and expertise using subjective logic.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
2010
Peer-to-Peer Netw. Appl., 2010
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Proceedings of the 18th Euromicro Conference on Parallel, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010
Proceedings of the ARES 2010, 2010
2009
A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing.
Proceedings of the 2nd IFIP Wireless Days, 2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Proceedings of the Privacy and Identity Management for Life, 2009
Proceedings of the NTMS 2009, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007
Proceedings of the European Conference on eHealth 2007, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007
2006
Location-based Security Framework for use of Handheld Devices in Medical Information Systems.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
Proceedings of the European Conference on eHealth 2006, 2006
2005
Comput. Stand. Interfaces, 2005
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005
Proceedings of the Information Security Practice and Experience, 2005
2003
Proceedings of the IEEE 14th International Symposium on Personal, 2003
Towards a Probabilistic Framework for Analogous Multi-Modal Human-Computer Interaction.
Proceedings of the Human-Computer Interaction: Universal Access in HCI: Inclusive Design in the Information Society, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
1998
Proceedings of the Sequences and their Applications, 1998
1995
On Public-Key Cryptosystem Based on Church-Rosser String-Rewriting Systems (Extended Abstract).
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995
1987
Proceedings of the Fundamentals of Computation Theory, 1987