From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Emergent Properties & Security: The Complexity ofSecurity as a Science., и . NSPW, стр. 1-14. ACM, (2014)Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm., и . LEET, USENIX Association, (2011)Helping the Phish Detect the Lure.. Financial Cryptography, том 3570 из Lecture Notes in Computer Science, стр. 90. Springer, (2005)A link graph-based approach to identify forum spam., , , и . Secur. Commun. Networks, 8 (2): 176-188 (2015)Mobile location tracking in metro areas: malnets and others., и . ACM Conference on Computer and Communications Security, стр. 85-96. ACM, (2010)Simple permutations mix well., , , и . Theor. Comput. Sci., 348 (2-3): 251-261 (2005)IPSec: Performance Analysis and Enhancements., , и . ICC, стр. 1527-1532. IEEE, (2007)Efficient Amplification of the Security of Weak Pseudo-Random Function Generators.. J. Cryptol., 16 (1): 1-24 (2003)Practice & prevention of home-router mid-stream injection attacks., и . eCrime, стр. 1-14. IEEE, (2008)The Nuts and Bolts of a Forum Spam Automator., , и . LEET, USENIX Association, (2011)