From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Poolsappasit, Nayot
add a person with the name Poolsappasit, Nayot
 

Другие публикации лиц с тем же именем

Towards a scalable model for location privacy., и . SPRINGL, стр. 46-51. ACM, (2008)Enhancing Internet Domain Name System Availability by Building Rings of Cooperation Among Cache Resolvers, и . 8th Annual IEEE SMC Information Assurance Workshop (IAW 2007), (июня 2007)Optimal security hardening on attack tree models of networks: a cost-benefit analysis., , , и . Int. J. Inf. Sec., 11 (3): 167-188 (2012)Dynamic Security Risk Management Using Bayesian Attack Graphs., , и . IEEE Trans. Dependable Secur. Comput., 9 (1): 61-74 (2012)Towards Achieving Personalized Privacy for Location-Based Services., и . Trans. Data Priv., 2 (1): 77-99 (2009)Trust Management of Encrypted Data Aggregation in a Sensor Network Environment., , и . MDM, стр. 157-166. IEEE Computer Society, (2012)An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems., , и . DBSec, том 5094 из Lecture Notes in Computer Science, стр. 297-312. Springer, (2008)A Secure Data Aggregation Based Trust Management Approach for Dealing with Untrustworthy Motes in Sensor Network., и . ICPP, стр. 138-147. IEEE Computer Society, (2011)ETIS - Efficient Trust and Identity Management System for Federated Service Providers., , и . AINA, стр. 219-226. IEEE Computer Society, (2013)Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents., и . Int. J. Secur. Networks, 3 (2): 80-94 (2008)