From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery., , , , и . IEEE Trans. Parallel Distributed Syst., 21 (4): 452-465 (2010)Vulnerability Discovery with Attack Injection., , , , и . IEEE Trans. Software Eng., 36 (3): 357-370 (2010)Low-Level Multimedia Synchronization Algorithms on Broadband Networks., и . ACM Multimedia, стр. 423-434. ACM Press, (1995)Asynchronous Byzantine consensus with 2f+1 processes., , и . SAC, стр. 475-480. ACM, (2010)Intrusion-Tolerant Architectures: Concepts and Design., , и . WADS, том 2677 из Lecture Notes in Computer Science, стр. 3-36. Springer, (2002)N-party BAR Transfer., , , и . OPODIS, том 7109 из Lecture Notes in Computer Science, стр. 392-408. Springer, (2011)The Design of a COTSReal-Time Distributed Security Kernel., , и . EDCC, том 2485 из Lecture Notes in Computer Science, стр. 234-252. Springer, (2002)Vulnerability-Tolerant Transport Layer Security., , и . OPODIS, том 95 из LIPIcs, стр. 28:1-28:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)JITeR: Just-in-time application-layer routing., , , , , , , и . Comput. Networks, (2016)Clouds-of-Clouds for Dependability and Security: Geo-replication Meets the Cloud.. Euro-Par Workshops, том 8374 из Lecture Notes in Computer Science, стр. 95-104. Springer, (2013)