From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors., , , и . Serv. Oriented Comput. Appl., 12 (2): 123-135 (2018)Polyinstantation for Cover Stories., и . ESORICS, том 648 из Lecture Notes in Computer Science, стр. 307-328. Springer, (1992)Globally Consistent Event Ordering in One-Directional Distributed Environments., , и . IEEE Trans. Parallel Distributed Syst., 7 (6): 665-670 (1996)Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks., , , и . CoRR, (2020)Satisfiability of Quantitative Temporal Constraints with Multiple Granularities., , и . CP, том 1330 из Lecture Notes in Computer Science, стр. 435-449. Springer, (1997)Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information., , и . ESORICS, том 875 из Lecture Notes in Computer Science, стр. 431-445. Springer, (1994)Trusted Recovery., , и . Commun. ACM, 42 (7): 71-75 (1999)A Flexible Authorization Mechanism for Relational Data Management Systems., , и . ACM Trans. Inf. Syst., 17 (2): 101-140 (1999)An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads., и . ACM Conference on Computer and Communications Security, стр. 118-125. ACM, (1994)A propositional policy algebra for access control., и . ACM Trans. Inf. Syst. Secur., 6 (2): 286-325 (2003)