From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels., , , , , и . IEEE Trans. Dependable Secur. Comput., 5 (4): 208-223 (2008)A Survey of Distributed Enterprise Network and Systems Management Paradigms., , и . J. Netw. Syst. Manag., 7 (1): 9-26 (1999)Integration of Internet and telecommunications: an architecture for hybrid services., , , и . IEEE J. Sel. Areas Commun., 17 (9): 1563-1579 (1999)Key Agreement in Peer-to-Peer Wireless Networks., , и . Proc. IEEE, 94 (2): 467-478 (2006)Revolutionizing Medical Data Sharing Using Advanced Privacy Enhancing Technologies: Technical, Legal and Ethical Synthesis., , , , , , и . CoRR, (2020)Revocation games in ephemeral networks., , , и . ACM Conference on Computer and Communications Security, стр. 199-210. ACM, (2008)On the Age of Pseudonyms in Mobile Ad Hoc Networks., , , и . INFOCOM, стр. 1577-1585. IEEE, (2010)The Impact of the Internet on Telecommunication Architectures., , , и . Comput. Networks, 31 (3): 257-273 (1999)Self-Organized Public-Key Management for Mobile Ad Hoc Networks., , и . IEEE Trans. Mob. Comput., 2 (1): 52-64 (2003)Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks., , и . IEEE Trans. Mob. Comput., 5 (5): 463-476 (2006)