From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Ultimate Frontier for Privacy and Security: Medicine.. WISEC, стр. 1. ACM, (2016)Small worlds in security systems: an analysis of the PGP certificate graph., , и . NSPW, стр. 28-35. ACM, (2002)Privacy in the Genomic Era., , , , , , , и . ACM Comput. Surv., 48 (1): 6:1-6:44 (2015)Security Mechanisms with Selfish Players in Wireless Networks.. Financial Cryptography, том 6052 из Lecture Notes in Computer Science, стр. 2. Springer, (2010)A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks., , и . Financial Cryptography, том 2742 из Lecture Notes in Computer Science, стр. 15-33. Springer, (2003)Perceptual Video Quality and Activity Metrics: Optimization of Video Services Based on MPEG-2 Encoding., и . COST 237 Workshop, том 1185 из Lecture Notes in Computer Science, стр. 249-265. Springer, (1996)Game theory meets network security and privacy., , , , и . ACM Comput. Surv., 45 (3): 25:1-25:39 (2013)Securing Vehicular Communications., , и . IEEE Wirel. Commun., 13 (5): 8-15 (2006)NASCENT: network layer service for vicinity ad-hoc groups., и . SECON, стр. 439-448. IEEE, (2004)Joint mobility and routing for lifetime elongation in wireless sensor networks., и . INFOCOM, стр. 1735-1746. IEEE, (2005)