From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adversarial Security: Getting to the Root of the Problem., , и . iNetSec, том 6555 из Lecture Notes in Computer Science, стр. 47-55. Springer, (2010)Maximise unsafe path routing protocol for forest fire monitoring system using Wireless Sensor Networks., , , , , и . NESEA, стр. 1-8. IEEE Computer Society, (2012)Fooling a Liveness-Detecting Capacitive Fingerprint Scanner., , , и . Cryptography and Security, том 6805 из Lecture Notes in Computer Science, стр. 484-490. Springer, (2012)Evidential Notions of Defensibility and Admissibility with Property Preservation., , , и . iNetSec, том 6555 из Lecture Notes in Computer Science, стр. 134-139. Springer, (2010)On the Design of Forgiving Biometric Security Systems., , и . iNetSeC, том 309 из IFIP Advances in Information and Communication Technology, стр. 1-8. Springer, (2009)