From post

Metric Strand Spaces for Locale Authentication Protocols.

, , и . IFIPTM, том 321 из IFIP Advances in Information and Communication Technology, стр. 79-94. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mobile Computations and Trust.. ECOOP Workshops, том 1543 из Lecture Notes in Computer Science, стр. 305. Springer, (1998)Security for Mobile Agents: Authentication and State Appraisal., , и . ESORICS, том 1146 из Lecture Notes in Computer Science, стр. 118-130. Springer, (1996)Rule-Based Topological Vulnerability Analysis., , и . MMM-ACNS, том 3685 из Lecture Notes in Computer Science, стр. 23-37. Springer, (2005)A Logical View of Assignments., и . Constructivity in Computer Science, том 613 из Lecture Notes in Computer Science, стр. 131-149. Springer, (1991)Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility., , , , , , и . NeuroImage, 22 (4): 1646-1656 (2004)Securely sharing neuroimagery., , , , , и . CIKM, стр. 375-377. ACM, (2003)Redirection policies for mission-based information sharing., , и . SACMAT, стр. 210-218. ACM, (2006)Type Theoretic Properties of Assignments. University of Illinois Urbana-Champaign, USA, (1992)Everybody Share: The Challenge of Data-Sharing Systems., , и . Computer, 41 (9): 54-61 (2008)Fingerprinting Relational Databases: Schemes and Specialties., , и . IEEE Trans. Dependable Secur. Comput., 2 (1): 34-45 (2005)