From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mapping the File Systems Genome: rationales, technique, results and applications., , , и . CoRR, (2013)RFID security and privacy: long-term research or short-term tinkering?, , , , , , и . WISEC, стр. 160. ACM, (2008)Vessels Cybersecurity: Issues, Challenges, and the Road Ahead., , , , и . CoRR, (2020)Evaluating the Risk of Adopting RBAC Roles., , , и . DBSec, том 6166 из Lecture Notes in Computer Science, стр. 303-310. Springer, (2010)Addressing the shortcomings of one-way chains., , , и . AsiaCCS, стр. 289-296. ACM, (2006)eRIPP-FS: Enforcing privacy and security in RFID., , , и . Secur. Commun. Networks, 3 (1): 58-70 (2010)Intrusion Detection at the Network Edge: Solutions, Limitations, and Future Directions., , и . EDGE, том 11520 из Lecture Notes in Computer Science, стр. 59-75. Springer, (2019)Detecting Drones Status via Encrypted Traffic Analysis., , , и . WiseML@WiSec, стр. 67-72. ACM, (2019)Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments)., , , и . WiSec, стр. 12-22. ACM, (2019)GPU Algorithms for K-Anonymity in Microdata., , , и . CNS, стр. 1-9. IEEE, (2019)