From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The dual receiver cryptosystem and its applications., , , и . CCS, стр. 330-343. ACM, (2004)Efficient, DoS-resistant, secure key exchange for internet protocols., , , , , , и . ACM Conference on Computer and Communications Security, стр. 48-58. ACM, (2002)Detection and analysis of eavesdropping in anonymous communication networks., , , и . Int. J. Inf. Sec., 14 (3): 205-220 (2015)Execution transactions for defending against software failures: use and evaluation., и . Int. J. Inf. Sec., 5 (2): 77-91 (2006)How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints., , , и . ACM Trans. Priv. Secur., 19 (1): 2:1-2:31 (2016)Secure quality of service handling: SQoSH., , , , и . IEEE Commun. Mag., 38 (4): 106-112 (2000)Designing Host and Network Sensors to Mitigate the Insider Threat., , , , и . IEEE Secur. Priv., 7 (6): 22-29 (2009)A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions., , , , , и . Advances in Cyber Security, Springer, (2019)A Survey of Voice over IP Security Research.. ICISS, том 5905 из Lecture Notes in Computer Science, стр. 1-17. Springer, (2009)Privacy as an Operating System Service., , и . HotSec, USENIX Association, (2006)