From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Keys: Practical Cryptographic Second Factors for the Modern Web., , , , и . Financial Cryptography, том 9603 из Lecture Notes in Computer Science, стр. 422-440. Springer, (2016)Protected Login., и . Financial Cryptography Workshops, том 7398 из Lecture Notes in Computer Science, стр. 44-52. Springer, (2012)Extensible Security Architecture for Java., , , и . SOSP, стр. 116-128. ACM, (1997)Operating System Review 31(5).Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation., , и . RFC, (октября 2018)Building an Encrypted and Searchable Audit Log., , , и . NDSS, The Internet Society, (2004)A reference architecture supporting hypervideo content for ITV and the internet domain., и . Comput. Graph., 28 (2): 179-191 (2004)Sliding-window self-healing key distribution., , , и . SSRS@CCS, стр. 82-90. ACM, (2003)Bridging Geospatial Meta-data Standards Towards Distributed Meta-data Information Systems., и . MD, IEEE Computer Society, (1999)A Security Infrastructure for Distributed Java Applications., , и . S&P, стр. 15-26. IEEE Computer Society, (2000)Mobile Liquid 2D Scatter Space (ML2DSS)., и . IV, стр. 494-498. IEEE Computer Society, (2004)