From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

BASE: an incrementally deployable mechanism for viable IP spoofing prevention., , , и . AsiaCCS, стр. 20-31. ACM, (2007)New Directions for High-throughput and High-security Communication.. ICISSP, стр. 5. SCITEPRESS, (2021)KISS: "Key It Simple and Secure" Corporate Key Management., , , , и . TRUST, том 7904 из Lecture Notes in Computer Science, стр. 1-18. Springer, (2013)Consent Routing: Towards Bilaterally Trusted Communication Paths., , , и . ICDCS, стр. 1247-1257. IEEE, (2022)Bootstrapping Trust in Commodity Computers., , и . IEEE Symposium on Security and Privacy, стр. 414-429. IEEE Computer Society, (2010)SCION: Scalability, Control, and Isolation on Next-Generation Networks., , , , , и . IEEE Symposium on Security and Privacy, стр. 212-227. IEEE Computer Society, (2011)CLAMP: Practical Prevention of Large-Scale Data Leaks., , , , и . SP, стр. 154-169. IEEE Computer Society, (2009)GMA: A Pareto Optimal Distributed Resource-Allocation Algorithm., , , и . SIROCCO, том 12810 из Lecture Notes in Computer Science, стр. 243-261. Springer, (2021)Alcatraz: Data Exfiltration-Resilient Corporate Network Architecture., , и . CIC, стр. 176-187. IEEE Computer Society, (2018)Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows., , , , , , , , , и . SRDS, стр. 265-276. IEEE, (2021)