From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Controller Agent Model to Counteract DoS Attacks in Multiple Domains., и . Integrated Network Management, том 246 из IFIP Conference Proceedings, стр. 113-116. Kluwer, (2003)Improving Software Security Through an Integrated Approach., , и . SECRYPT, стр. 437-442. INSTICC Press, (2006)Analysis of traceback techniques., и . ACSW, том 54 из CRPIT, стр. 115-124. Australian Computer Society, (2006)Towards a Generic Logic for Analysing Network Protocols., , и . ICDCS Workshop on Internet, стр. A19-A26. (2000)Secure distribution and access of XML documents., , и . IJHPCN, 3 (5/6): 356-365 (2005)A novel dynamic key management scheme for secure multicasting., , и . ICON, стр. 391-395. IEEE, (2003)Design of Secure End-toEnd Protocols for Mobile Systems., и . IFIP World Conference on Mobile Communications, том 66 из IFIP Conference Proceedings, стр. 258-266. Chapman & Hall, (1996)A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks., , , и . IEEE Trans. Computers, 64 (3): 627-639 (2015)Security as a Service Model for Cloud Environment., и . IEEE Trans. Network and Service Management, 11 (1): 60-75 (2014)Robust non-interactive oblivious transfer., , , и . IEEE Communications Letters, 7 (4): 153-155 (2003)