From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Security of a Two-Factor Authentication Scheme., и . WISTP, том 6033 из Lecture Notes in Computer Science, стр. 245-252. Springer, (2010)A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment., и . ICISSP, стр. 588-595. SciTePress, (2019)Ensuring Application Integrity: A Survey on Techniques and Tools., и . IMIS, стр. 192-199. IEEE Computer Society, (2015)Reliable Voice-Based Transactions over VoIP Communications., , , и . IMIS, стр. 101-108. IEEE Computer Society, (2015)An internet role-game for the laboratory of network security course., и . ITiCSE, стр. 240-244. ACM, (2008)The Design and Implementation of a Transparent Cryptographic File System for UNIX., , , и . USENIX ATC, FREENIX Track, стр. 199-212. USENIX, (2001)Measuring the effectiveness of containerization to prevent power draining attacks., , и . M&N, стр. 1-6. IEEE, (2017)The Dark Side of the Interconnection: Security and Privacy in the Web of Things., и . IMIS, стр. 205-212. IEEE Computer Society, (2015)Flexible and robust Enterprise Right Management., , и . ISCC, стр. 1257-1262. IEEE Computer Society, (2016)Interoperability between Federated Authentication Systems., и . IMIS, стр. 493-498. IEEE Computer Society, (2014)