From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Virtual environment for the navigation of ideas and concepts in education (V.E.N.I.C.E).. AVI, стр. 428. ACM Press, (2010)Security Protocol Deployment Risk., , и . Security Protocols Workshop, том 6615 из Lecture Notes in Computer Science, стр. 12-20. Springer, (2008)Network Access Control Interoperation using Semantic Web Techniques., , и . WOSIS, стр. 26-37. INSTICC Press, (2008)The Specification and Implementation of ``Commercial'' Security Requirements Including Dynamic Segregation of Duties.. ACM Conference on Computer and Communications Security, стр. 125-134. ACM, (1997)Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems.. IFIPTM, том 401 из IFIP Advances in Information and Communication Technology, стр. 193-207. Springer, (2013)Authorisation Subterfuge by Delegation in Decentralised Networks., и . Security Protocols Workshop, том 4631 из Lecture Notes in Computer Science, стр. 97-102. Springer, (2005)A collaborative approach to autonomic security protocols., и . NSPW, стр. 13-21. ACM, (2004)Conduit cascades and secure synchronization.. NSPW, стр. 141-150. ACM, (2000)A Bloom Filter Based Model for Decentralized Authorization., и . Int. J. Intell. Syst., 28 (6): 565-582 (2013)External Consistency and the Verification of Security Protocols (Transcript of Discussion).. Security Protocols Workshop, том 1550 из Lecture Notes in Computer Science, стр. 28-35. Springer, (1998)