From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder., , и . Communications and Multimedia Security, том 175 из IFIP, стр. 209-221. Springer, (2004)A Framework for Exploiting Security Expertise in Application Development., , , , , и . TrustBus, том 4083 из Lecture Notes in Computer Science, стр. 62-70. Springer, (2006)Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification., , и . Comput. Commun., 22 (8): 697-709 (1999)Towards a framework for evaluating certificate status information mechanisms., , , , , и . Comput. Commun., 26 (16): 1839-1850 (2003)A generic accounting scheme for next generation networks., , и . Comput. Networks, 53 (14): 2408-2426 (2009)Addressing privacy requirements in system design: the PriS method., , и . Requir. Eng., 13 (3): 241-255 (2008)A framework for designing cloud forensic-enabled services (CFeS)., , , и . Requir. Eng., 24 (3): 403-430 (2019)A framework for identity privacy in SIP., , , и . J. Netw. Comput. Appl., 33 (1): 16-28 (2010)A soft computing approach for privacy requirements engineering: The PriS framework., , и . Appl. Soft Comput., 11 (7): 4341-4348 (2011)Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks., , и . IEEE Commun. Surv. Tutorials, 9 (1-4): 18-28 (2007)