From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service., , , и . IMCOM, стр. 62:1-62:5. ACM, (2016)Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels., , и . ICUIMC, стр. 57. ACM, (2011)Don't count the number of friends when you are spreading information in social networks.. ICUIMC, стр. 43:1-43:7. ACM, (2014)Secure and DoS-Resilient Fragment Authentication in CCN-Based Vehicular Networks., и . Wirel. Commun. Mob. Comput., (2018)Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services., , , и . AsiaCCS, стр. 352-365. ACM, (2019)POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack., , , , и . ACM Conference on Computer and Communications Security, стр. 1835-1837. ACM, (2016)RAD: Recipient-anonymous data delivery based on public routing proxies., и . Comput. Networks, 55 (15): 3469-3484 (2011)Security challenges with network functions virtualization., , , и . Future Gener. Comput. Syst., (2017)An Eye for an Eye: Economics of Retaliation in Mining Pools., , , и . AFT, стр. 169-182. ACM, (2019)MurQRI: Encrypted Multi-layer QR Codes for Electronic Identity Management., , и . SVCC, том 1383 из Communications in Computer and Information Science, стр. 98-108. Springer, (2020)