Vladimir A. Oleshchuk
Orcid: 0000-0002-7905-1016Affiliations:
- University of Agder, Kristiansand, Norway
  According to our database1,
  Vladimir A. Oleshchuk
  authored at least 86 papers
  between 1987 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on zbmath.org
- 
    on orcid.org
- 
    on dl.acm.org
On csauthors.net:
Bibliography
  2025
    Proceedings of the 21st IEEE International Conference on Smart Technologies, 2025
    
  
  2023
A survey on blockchain envisioned attribute based access control for internet of things: Overview, comparative analysis, and open research challenges.
    
  
    Comput. Networks, November, 2023
    
  
    IEEE Trans. Serv. Comput., 2023
    
  
A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled Internet of Things.
    
  
    Proceedings of the 20th International Conference on Security and Cryptography, 2023
    
  
    Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023
    
  
  2020
    Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
    
  
  2019
An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment.
    
  
    ACM Trans. Internet Techn., 2019
    
  
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage.
    
  
    Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019
    
  
    Proceedings of the New Trends in Databases and Information Systems, 2019
    
  
  2018
Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health Environment.
    
  
    Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
    
  
    Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
    
  
  2017
Attribute based access control scheme with controlled access delegation for collaborative E-health environments.
    
  
    J. Inf. Secur. Appl., 2017
    
  
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records.
    
  
    Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
    
  
    Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017
    
  
An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment.
    
  
    Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
    
  
  2016
    Soc. Netw. Anal. Min., 2016
    
  
    Secur. Commun. Networks, 2016
    
  
    J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
    
  
Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions.
    
  
    Int. J. Inf. Manag., 2016
    
  
    Proceedings of the 24th Euromicro International Conference on Parallel, 2016
    
  
A Novel Framework for Security Enforcement in Networks for Disaster and Crisis Management.
    
  
    Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016
    
  
Secure Multi-party Based Cloud Computing Framework for Statistical Data Analysis of Encrypted Data.
    
  
    Proceedings of the 2016 conference on Innovations in Clouds, Internet and Networks, 2016
    
  
An attribute based access control scheme for secure sharing of electronic health records.
    
  
    Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016
    
  
A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing.
    
  
    Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
    
  
  2015
    World Wide Web, 2015
    
  
    Inf. Syst., 2015
    
  
An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees.
    
  
    Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015
    
  
    Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015
    
  
    Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
    
  
    Proceedings of the Codes, Cryptology, and Information Security, 2015
    
  
  2014
    IEEE Trans. Mob. Comput., 2014
    
  
An improvement of the batch-authentication and key agreement framework for P2P-based online social networks.
    
  
    Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014
    
  
  2013
Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs.
    
  
    Comput. Commun., 2013
    
  
    Proceedings of the 11th IEEE International Conference on Industrial Informatics, 2013
    
  
    Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013
    
  
    Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
    
  
Addressing the Terms-of-Service Threat - Client-side Security and Policy Control for Free File Storage Services.
  
    Proceedings of the CLOSER 2013, 2013
    
  
  2012
    Comput. Stand. Interfaces, 2012
    
  
FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs.
    
  
    Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012
    
  
An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks.
    
  
    Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012
    
  
    Proceedings of the 6th IEEE International Conference on Intelligent Systems, 2012
    
  
    Proceedings of the 1st International IEEE Symposium on Wireless Systems, 2012
    
  
  2011
    Wirel. Pers. Commun., 2011
    
  
    Wirel. Pers. Commun., 2011
    
  
Semantic retrieval: an approach to representing, searching and summarising text documents.
    
  
    Int. J. Inf. Technol. Commun. Convergence, 2011
    
  
    Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011
    
  
    Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
    
  
    Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011
    
  
A Cognitive-based scheme for user reliability and expertise assessment in Q&A social networks.
    
  
    Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011
    
  
    Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011
    
  
Collaborative assessment of information provider's reliability and expertise using subjective logic.
    
  
    Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
    
  
  2010
    Peer-to-Peer Netw. Appl., 2010
    
  
    Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
    
  
    Proceedings of the 18th Euromicro Conference on Parallel, 2010
    
  
    Proceedings of the Global Communications Conference, 2010
    
  
    Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010
    
  
    Proceedings of the ARES 2010, 2010
    
  
  2009
A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing.
    
  
    Proceedings of the 2nd IFIP Wireless Days, 2009
    
  
    Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
    
  
    Proceedings of the Privacy and Identity Management for Life, 2009
    
  
    Proceedings of the NTMS 2009, 2009
    
  
    Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
    
  
  2008
    Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
    
  
    Proceedings of the The Third International Conference on Availability, 2008
    
  
  2007
    Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007
    
  
    Proceedings of the European Conference on eHealth 2007, 2007
    
  
    Proceedings of the Third International Symposium on Information Assurance and Security, 2007
    
  
    Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007
    
  
  2006
Location-based Security Framework for use of Handheld Devices in Medical Information Systems.
    
  
    Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
    
  
    Proceedings of the European Conference on eHealth 2006, 2006
    
  
  2005
    Comput. Stand. Interfaces, 2005
    
  
    Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005
    
  
    Proceedings of the Information Security Practice and Experience, 2005
    
  
  2003
    Proceedings of the IEEE 14th International Symposium on Personal, 2003
    
  
Towards a Probabilistic Framework for Analogous Multi-Modal Human-Computer Interaction.
  
    Proceedings of the Human-Computer Interaction: Universal Access in HCI: Inclusive Design in the Information Society, 2003
    
  
    Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
    
  
  1998
    Proceedings of the Sequences and their Applications, 1998
    
  
  1995
On Public-Key Cryptosystem Based on Church-Rosser String-Rewriting Systems (Extended Abstract).
    
  
    Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995
    
  
  1987
    Proceedings of the Fundamentals of Computation Theory, 1987