From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a formal system-to-system authentication protocol., и . Comput. Commun., 19 (12): 954-961 (1996)Editorial., , , , , , и . Comput. Secur., (2014)Editorial., и . Comput. Secur., 28 (6): 325-326 (2009)Editorial., и . Comput. Secur., 30 (2-3): 89-90 (2011)Editorial., и . Comput. Secur., 29 (5): 521-522 (2010)Editorial., и . Comput. Secur., 29 (2): 165-166 (2010)An Ontology-Driven antiSPIT Architecture., и . e-Democracy, том 26 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 189-198. Springer, (2009)In Cloud We Trust: Risk-Assessment-as-a-Service., , и . IFIPTM, том 401 из IFIP Advances in Information and Communication Technology, стр. 100-110. Springer, (2013)Towards Indeterminacy-Tolerant Access Control in IoT., , , и . Handbook of Big Data and IoT Security, Springer, (2019)A Generic Privacy Enhancing Technology for Pervasive Computing Environments., , и . TrustBus, том 4083 из Lecture Notes in Computer Science, стр. 103-113. Springer, (2006)