From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cyber security quantification model., и . SIN, стр. 142-148. ACM, (2010)Survey of Security Challenges in Grid Environment., , , и . DICTAP (1), том 166 из Communications in Computer and Information Science, стр. 741-752. Springer, (2011)Kerberos Implementation in Manets., , , и . SECRYPT, стр. 161-166. INSTICC Press, (2008)SAKE - Secure Authenticated Key Establishment in Sensor Networks., , , и . SECRYPT, стр. 154-160. INSTICC Press, (2008)S-box Security Analysis of NIST Lightweight Cryptography Candidates: A Critical Empirical Study., , , , и . CoRR, (2024)