From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

WAP PKI and certification path validation., , и . Int. J. Internet Protoc. Technol., 2 (2): 88-95 (2007)H-OCSP: A protocol to reduce the processing burden in online certificate status validation., , , и . Electron. Commer. Res., 8 (4): 255-273 (2008)Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems, , и . CoRR, (2013)PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios., , и . CRITIS, том 4347 из Lecture Notes in Computer Science, стр. 151-165. Springer, (2006)Reducing the Computational Cost of Certification Path Validation in Mobile Payment., , , и . EuroPKI, том 4582 из Lecture Notes in Computer Science, стр. 280-296. Springer, (2007)Implementation of an Efficient Authenticated Dictionary for Certificate Revocation., , , и . ISCC, стр. 238-243. IEEE Computer Society, (2003)A protocol for detecting malicious hosts based on limiting the execution time of mobile agents., , , и . ISCC, стр. 251-256. IEEE Computer Society, (2003)On Web user tracking: How third-party http requests track users' browsing patterns for personalised advertising., , и . Med-Hoc-Net, стр. 1-6. IEEE, (2016)Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts., , , , и . DEXA, том 2736 из Lecture Notes in Computer Science, стр. 927-936. Springer, (2003)Smart Deferral of Messages for Privacy Protection in Online Social Networks., , , и . CoRR, (2014)