From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy-Aware Access Protocols for MEC Applications in 5G., , и . Network, 2 (2): 203-224 (2022)Privacy Preserving AKMA in 5G., , и . SSR, стр. 45-56. ACM, (2019)Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems., и . ESAS, том 3313 из Lecture Notes in Computer Science, стр. 95-106. Springer, (2004)AKMA for Secure Multi-access Edge Computing Mobility in 5G., , и . ICCSA (Workshops 4), том 13380 из Lecture Notes in Computer Science, стр. 432-449. Springer, (2022)Authentication of fragments with short tags., , и . Theor. Comput. Sci., (2024)On De-synchronization of User Pseudonyms in Mobile Networks., , , и . ICISS, том 10717 из Lecture Notes in Computer Science, стр. 347-366. Springer, (2017)Credential Provisioning and Device Configuration with EAP., , , , , и . MobiWac, стр. 87-96. ACM, (2021)Attestation with Constrained Relying Party., , , и . CoRR, (2023)Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks., , , , и . Mob. Networks Appl., 18 (3): 413-428 (2013)Privacy of the long-term identities in cellular networks., и . MobiMedia, стр. 167-175. ACM, (2016)