From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Hardware Virtualization Based Component Sandboxing Architecture., , и . J. Softw., 7 (9): 2107-2118 (2012)Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records., , , и . MedInfo, том 129 из Studies in Health Technology and Informatics, стр. 498-502. IOS Press, (2007)Securing Grid Data Using Mandatory Access Controls., , и . ACSW, том 68 из CRPIT, стр. 25-32. Australian Computer Society, (2007)The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications., и . ACISP, том 4058 из Lecture Notes in Computer Science, стр. 183-194. Springer, (2006)Who Goes There? Internet Banking: A Matter of Risk and Reward., и . ACISP, том 3574 из Lecture Notes in Computer Science, стр. 336-357. Springer, (2005)Cyber Warfare - Techniques, Tactics and Tools for Security Practitioners.. Comput. Secur., 31 (4): 637 (2012)File Security in Wordperfect 5.0., и . Cryptologia, 15 (1): 57-66 (1991)Evolving a Secure Internet., , и . SEC, том 405 из IFIP Advances in Information and Communication Technology, стр. 42-54. Springer, (2013)Background to the Development of a Curriculum for the History of "Cyber" and "Communications" Security., , и . World Conference on Information Security Education, том 406 из IFIP Advances in Information and Communication Technology, стр. 39-47. Springer, (2013)An Efficient Public Key Management System: An Application In Vehicular Ad Hoc Networks., , , и . PACIS, стр. 175. Queensland University of Technology, (2011)