From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model.. IACR Cryptology ePrint Archive, (2007)Empirical vulnerability analysis of automated smart contracts security testing on blockchains., , , и . CASCON, стр. 103-113. ACM, (2018)Using Social Media Data to Improve Situational Awareness during Emergent Events., , , и . AMCIS, Association for Information Systems, (2018)Improving Security Awareness in the Government Sector., , , , и . DG.O, стр. 1-7. ACM, (2016)Guest Editorial: Multimedia Social Network Security and Applications., и . Multimedia Tools Appl., 76 (3): 3163-3168 (2017)Designing Sensing as a Service (S2aaS) Ecosystem for Internet of Things., , , , , и . CoRR, (2019)A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks., , и . RFIDSec, том 10155 из Lecture Notes in Computer Science, стр. 30-44. Springer, (2016)Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis., , , и . AISC, том 161 из CRPIT, стр. 53-56. Australian Computer Society, (2015)Errors in Computational Complexity Proofs for Protocols., , и . ASIACRYPT, том 3788 из Lecture Notes in Computer Science, стр. 624-643. Springer, (2005)Examining Indistinguishability-Based Proof Models for Key Establishment Protocols., , и . ASIACRYPT, том 3788 из Lecture Notes in Computer Science, стр. 585-604. Springer, (2005)