From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Measuring the effectiveness of containerization to prevent power draining attacks., , и . M&N, стр. 1-6. IEEE, (2017)The Dark Side of the Interconnection: Security and Privacy in the Web of Things., и . IMIS, стр. 205-212. IEEE Computer Society, (2015)Flexible and robust Enterprise Right Management., , и . ISCC, стр. 1257-1262. IEEE Computer Society, (2016)Interoperability between Federated Authentication Systems., и . IMIS, стр. 493-498. IEEE Computer Society, (2014)Virtual lab: A concrete experience in building multi-purpose virtualized labs for Computer Science Education., , , , , , и . SoftCOM, стр. 1-5. IEEE, (2012)A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code., и . SCN, том 2576 из Lecture Notes in Computer Science, стр. 219-233. Springer, (2002)An internet role-game for the laboratory of network security course., и . ITiCSE, стр. 240-244. ACM, (2008)A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment., и . ICISSP, стр. 588-595. SciTePress, (2019)On the Security of a Two-Factor Authentication Scheme., и . WISTP, том 6033 из Lecture Notes in Computer Science, стр. 245-252. Springer, (2010)Reliable Voice-Based Transactions over VoIP Communications., , , и . IMIS, стр. 101-108. IEEE Computer Society, (2015)