Остановите войну!
for scientists:
default search action
Vladimir A. Oleshchuk
- > Home > Persons > Vladimir A. Oleshchuk
Publications
- 2023
- [j20]Syed Sajid Ullah, Vladimir A. Oleshchuk, Harsha S. Gardiyawasam Pussewalage:
A survey on blockchain envisioned attribute based access control for internet of things: Overview, comparative analysis, and open research challenges. Comput. Networks 235: 109994 (2023) - [j19]Harsha Sandaruwan Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
A Delegatable Attribute Based Encryption Scheme for a Collaborative E-Health Cloud. IEEE Trans. Serv. Comput. 16(2): 787-801 (2023) - [c60]Syed Sajid Ullah, Vladimir A. Oleshchuk, Harsha S. Gardiyawasam Pussewalage:
A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled Internet of Things. SECRYPT 2023: 528-539 - 2020
- [c59]Kuruge Darshana Abeyrathna, Harsha S. Gardiyawasam Pussewalage, Sasanka N. Ranasinghe, Vladimir A. Oleshchuk, Ole-Christoffer Granmo:
Intrusion Detection with Interpretable Rules Generated Using the Tsetlin Machine. SSCI 2020: 1121-1130 - 2019
- [j18]Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment. ACM Trans. Internet Techn. 19(3): 41:1-41:22 (2019) - [c58]Danchen Zhang, Vladimir I. Zadorozhny, Vladimir A. Oleshchuk:
SLFTD: A Subjective Logic Based Framework for Truth Discovery. ADBIS (Short Papers and Workshops) 2019: 102-110 - 2018
- [c56]Mohamed Abomhara, Geir M. Køien, Vladimir A. Oleshchuk, Mohamed Hamid:
Towards Risk-aware Access Control Framework for Healthcare Information Sharing. ICISSP 2018: 312-321 - [c55]Harsha Sandaruwan Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health Environment. iThings/GreenCom/CPSCom/SmartData 2018: 1204-1211 - 2017
- [j17]Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
Attribute based access control scheme with controlled access delegation for collaborative E-health environments. J. Inf. Secur. Appl. 37: 50-64 (2017) - [c54]Harsha Sandaruwan Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment. CIC 2017: 421-428 - [c52]Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records. SACMAT 2017: 255-262 - 2016
- [j16]Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions. Int. J. Inf. Manag. 36(6): 1161-1173 (2016) - [j15]Huihui Yang, Vladimir A. Oleshchuk, Andreas Prinz:
Verifying Group Authentication Protocols by Scyther. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7(2): 3-19 (2016) - [j14]Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
Enforcing mobile security with location-aware role-based access control. Secur. Commun. Networks 9(5): 429-439 (2016) - [c51]Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing. CIC 2016: 46-53 - [c50]Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
An attribute based access control scheme for secure sharing of electronic health records. HealthCom 2016: 1-6 - [c48]Huihui Yang, Andreas Prinz, Vladimir A. Oleshchuk:
Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther. PDP 2016: 553-557 - 2015
- [j12]Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
A novel policy-driven reversible anonymisation scheme for XML-based services. Inf. Syst. 48: 164-178 (2015) - [j11]Konstantinos Pelechrinis, Vladimir Zadorozhny, Velin Kounev, Vladimir A. Oleshchuk, Mohd Anwar, Yiling Lin:
Automatic evaluation of information provider reliability and expertise. World Wide Web 18(1): 33-72 (2015) - [c47]Huihui Yang, Vladimir A. Oleshchuk:
A Dynamic Attribute-Based Authentication Scheme. C2SI 2015: 106-118 - [c46]Huihui Yang, Vladimir A. Oleshchuk:
Traceable hierarchical attribute-based authentication for the cloud. CNS 2015: 685-689 - [c44]Huihui Yang, Vladimir A. Oleshchuk:
An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees. NordSec 2015: 123-135 - 2014
- [j10]Yi Ren, Vladimir Zadorozhny, Vladimir A. Oleshchuk, Frank Y. Li:
A Novel Approach to Trust Management in Unattended Wireless Sensor Networks. IEEE Trans. Mob. Comput. 13(7): 1409-1423 (2014) - [c43]Huihui Yang, Vladimir A. Oleshchuk:
An improvement of the batch-authentication and key agreement framework for P2P-based online social networks. PRISMS 2014: 1-4 - 2013
- [j9]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li:
Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs. Comput. Commun. 36(9): 1067-1077 (2013) - [c42]Geir M. Køien, Vladimir A. Oleshchuk:
Addressing the Terms-of-Service Threat - Client-side Security and Policy Control for Free File Storage Services. CLOSER 2013: 562-569 - [c41]Huihui Yang, Lei Jiao, Vladimir A. Oleshchuk:
A General Framework for Group Authentication and Key Exchange Protocols. FPS 2013: 31-45 - [c39]Nils Ulltveit-Moe, Terje Gjøsæter, Sigurd M. Assev, Geir M. Køien, Vladimir A. Oleshchuk:
Privacy handling for critical information infrastructures. INDIN 2013: 688-694 - [i1]Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
Measuring Privacy Leakage for IDS Rules. CoRR abs/1308.5421 (2013) - 2012
- [j8]Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
Decision-cache based XACML authorisation and anonymisation for XML documents. Comput. Stand. Interfaces 34(6): 527-534 (2012) - [c36]Yi Ren, Vladimir Zadorozhny, Vladimir A. Oleshchuk, Frank Y. Li:
An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks. MDM 2012: 147-156 - [c34]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li, Selo Sulistyo:
FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs. WCNC 2012: 2841-2846 - 2011
- [j6]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li, Xiaohu Ge:
Security in Mobile Wireless Sensor Networks - A Survey. J. Commun. 6(2): 128-142 (2011) - [j5]Nils Ulltveit-Moe, Vladimir A. Oleshchuk, Geir M. Køien:
Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context. Wirel. Pers. Commun. 57(3): 317-338 (2011) - [j3]Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
A Composite Privacy Leakage Indicator. Wirel. Pers. Commun. 61(3): 511-526 (2011) - [c33]Konstantinos Pelechrinis, Vladimir Zadorozhny, Vladimir A. Oleshchuk:
Collaborative assessment of information provider's reliability and expertise using subjective logic. CollaborateCom 2011: 352-361 - [c31]Konstantinos Pelechrinis, Vladimir Zadorozhny, Vladimir A. Oleshchuk:
A Cognitive-based scheme for user reliability and expertise assessment in Q&A social networks. IRI 2011: 545-550 - [c29]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li, Selo Sulistyo:
SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs. LCN 2011: 271-274 - [c28]Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
Mobile Security with Location-Aware Role-Based Access Control. MobiSec 2011: 172-183 - 2010
- [c25]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li:
A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs. GLOBECOM 2010: 1-6 - [c24]Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
Privacy Violation Classification of Snort Ruleset. PDP 2010: 654-658 - 2009
- [c21]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li:
Secure and Efficient Data Storage in Unattended Wireless Sensor Networks. NTMS 2009: 1-5 - [c20]Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
PRIvacy LEakage Methodology (PRILE) for IDS Rules. PrimeLife 2009: 213-225 - [c18]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li:
A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing. Wireless Days 2009: 1-6 - 2005
- [c8]Geir M. Køien, Vladimir A. Oleshchuk:
Location Privacy for Cellular Systems; Analysis and Solution. Privacy Enhancing Technologies 2005: 40-58 - 2003
- [c7]Vladimir A. Oleshchuk, Asle Pedersen:
Ontology Based Semantic Similarity Comparison of Documents. DEXA Workshops 2003: 735-738 - [c6]Ole-Christoffer Granmo, Vladimir A. Oleshchuk, Mikael Snaprud:
Towards a Probabilistic Framework for Analogous Multi-Modal Human-Computer Interaction. HCI (4) 2003: 1407-1411 - [c5]Geir M. Køien, Vladimir A. Oleshchuk:
Spatio-temporal exposure control. PIMRC 2003: 2760-2764
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-01-26 19:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint