From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Magic mantle using social VPNs against centralized social networking services., , , и . PST, стр. 341-348. IEEE, (2016)VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls., и . NSDI, стр. 229-241. USENIX Association, (2014)An anti-spam scheme using capability-based access control., , , и . LCN, стр. 907-914. IEEE Computer Society, (2009)Implementation and Comparative Evaluation of an Outsourcing Approach to Real-Time Network Services in Commodity Hosted Environments., , и . CLOUD, том 10967 из Lecture Notes in Computer Science, стр. 189-205. Springer, (2018)Securing RPC with a Reference Monitor for System Calls., , и . ISSS, том 3233 из Lecture Notes in Computer Science, стр. 262-280. Springer, (2003)Name-Based Address Mapping for Virtual Private Networks., , и . IEICE Trans. Commun., 92-B (1): 200-208 (2009)Collaboration by passing access rights for personal protected Web resources., , и . CollaborateCom, стр. 1-10. ICST / IEEE, (2010)Capability-Based Egress Network Access Control for Transferring Access Rights., , , , и . ICITA (2), стр. 488-495. IEEE Computer Society, (2005)Sweets: A Decentralized Social Networking Service Application Using Data Synchronization on Mobile Devices., и . CollaborateCom, том 201 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 188-198. Springer, (2016)An Access Control Model for Web-Services That Supports Delegation and Creation of Authority., , , и . ICN, стр. 213-222. IEEE Computer Society, (2008)