From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model.. IACR Cryptology ePrint Archive, (2007)Performance of Android Forensics Data Recovery Tools., , и . CoRR, (2017)Guest Editorial: Multimedia Social Network Security and Applications., и . Multimedia Tools Appl., 76 (3): 3163-3168 (2017)Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis., , , и . AISC, том 161 из CRPIT, стр. 53-56. Australian Computer Society, (2015)On Lightweight Security Enforcement in Cyber-Physical Systems., , , и . LightSec, том 9542 из Lecture Notes in Computer Science, стр. 97-112. Springer, (2015)Errors in Computational Complexity Proofs for Protocols., , и . ASIACRYPT, том 3788 из Lecture Notes in Computer Science, стр. 624-643. Springer, (2005)Examining Indistinguishability-Based Proof Models for Key Establishment Protocols., , и . ASIACRYPT, том 3788 из Lecture Notes in Computer Science, стр. 585-604. Springer, (2005)Secret Signatures: How to Achieve Business Privacy Efficiently?, , , и . WISA, том 4867 из Lecture Notes in Computer Science, стр. 30-47. Springer, (2007)Review of insider threats in cyber security by Probst, Hunker, Gollman, Bishop.. SIGACT News, 43 (2): 38-40 (2012)Designing Sensing as a Service (S2aaS) Ecosystem for Internet of Things., , , , , и . CoRR, (2019)