From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Time Driven Methodology for Key Dimensioning in Multicast Communications., , и . SEC, том 250 из IFIP Conference Proceedings, стр. 121-132. Kluwer, (2003)CloRoFor: Cloud Robust Forensics., , и . CoRR, (2015)Social Fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling., , , , и . CoRR, (2017)The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack, , , , и . CoRR, (2009)Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary., , , , и . IACR Cryptology ePrint Archive, (2008)Freedom of speech: thwarting jammers via a probabilistic approach., и . WISEC, стр. 4:1-4:6. ACM, (2015)The smallville effect: social ties make mobile networks more secure against node capture attack., , , , и . MOBIWAC, стр. 99-106. ACM, (2010)Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques., , , , и . VTC Spring, стр. 634-638. IEEE, (2007)PRISM - Privacy-Preserving Search in MapReduce., , , и . Privacy Enhancing Technologies, том 7384 из Lecture Notes in Computer Science, стр. 180-200. Springer, (2012)Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System., , , и . Security Protocols Workshop, том 7622 из Lecture Notes in Computer Science, стр. 199-213. Springer, (2012)