From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption, , , , , , , , , и 1 other автор(ы). A Report by an Ad Hoc Group of Cryptographers and Computer Scientists, (1998)Risks, Responsibilities, and the Future: Walking the Tightwire.. ACM Conference on Computer Science, стр. 257. ACM, (1995)Keys under doormats., , , , , , , , , и 5 other автор(ы). Commun. ACM, 58 (10): 24-26 (2015)Risks in Digital Commerce.. Commun. ACM, 39 (1): 154 (1996)Internet Risks., и . Commun. ACM, 43 (5): 144 (2000)A Tale of Two Thousands.. Commun. ACM, 43 (3): 144 (2000)Optimistic optimization.. Commun. ACM, 47 (6): 112 (2004)Risks and myths of cloud computing and cloud storage.. Commun. ACM, 57 (10): 25-27 (2014)Protecting the Infrastructures.. Commun. ACM, 41 (1): 128 (1998)Hopes for Fewer Risks?. Commun. ACM, 40 (2): 170 (1997)