From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Report: CC-Based Design of Secure Application Systems.. ESSoS, том 5429 из Lecture Notes in Computer Science, стр. 111-121. Springer, (2009)Using interval logics for temporal analysis of security protocols., и . FMSE, стр. 24-31. ACM, (2003)Transformational Rewriting with Ruby., и . CHDL, том A-32 из IFIP Transactions, стр. 243-260. North-Holland, (1993)Timed Traces and Strand Spaces., и . CSR, том 4649 из Lecture Notes in Computer Science, стр. 373-386. Springer, (2007)Using a Language of Functions and Relations for VLSI Specification., и . FPCA, стр. 45-54. ACM, (1995)Rewriting with Constraints in T-Ruby., и . CHARME, том 683 из Lecture Notes in Computer Science, стр. 226-241. Springer, (1993)Introduction to Cybersecurity - A Multidisciplinary Challenge. Undergraduate Topics in Computer Science Springer, (2024)Designing a Secure Point-of-Sale System., , и . IWIA, стр. 51-65. IEEE Computer Society, (2006)Virtual seminar room-modelling and experimentation in horizontal and vertical integration., , , , , , и . MMSP, стр. 581-586. IEEE, (1999)Incremental Trust in Grid Computing., и . CCGRID, стр. 135-144. IEEE Computer Society, (2007)