From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

AGVI - Automatic Generation, Verification, and Implementation of Security Protocols., , и . CAV, том 2102 из Lecture Notes in Computer Science, стр. 241-245. Springer, (2001)Ariadne: a secure on-demand routing protocol for ad hoc networks., , и . MobiCom, стр. 12-23. ACM, (2002)(R)Evolutionary Bootstrapping of a Global PKI for Securing BGP., , , , и . HotNets, ACM SIGCOMM, (2006)Efficient security primitives derived from a secure aggregation algorithm., и . ACM Conference on Computer and Communications Security, стр. 521-534. ACM, (2008)OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms., , , , , и . ACM Conference on Computer and Communications Security, стр. 13-24. ACM, (2013)STRIDE: sanctuary trail - refuge from internet DDoS entrapment., , , , , , и . AsiaCCS, стр. 415-426. ACM, (2013)Towards Sustainable Evolution for the TLS Public-Key Infrastructure., , , и . AsiaCCS, стр. 637-649. ACM, (2018)QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework., , , и . USENIX Security Symposium, стр. 771-789. USENIX Association, (2022)Qualitative Intention-aware Attribute-based Access Control Policy Refinement., , , , , и . SACMAT, стр. 201-208. ACM, (2023)SIBRA: Scalable Internet Bandwidth Reservation Architecture., , , , , , , и . NDSS, The Internet Society, (2016)