From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scalable and Secure Group Rekeying in Wireless Sensor Networks., и . Parallel and Distributed Computing and Networks, стр. 84-88. IASTED/ACTA Press, (2006)An Overview of VOAC, a Virtual Organizations Access Control Infrastructure., и . Parallel and Distributed Computing and Networks, стр. 29-34. IASTED/ACTA Press, (2006)Consensus-based distributed intrusion detection for multi-robot systems., , , , и . ICRA, стр. 120-127. IEEE, (2008)Performance and Security Evaluation of SDN Networks in OMNeT++/INET., , и . CoRR, (2016)An Algorithm for Reconnecting Wireless Sensor Network Partitions., , и . EWSN, том 4913 из Lecture Notes in Computer Science, стр. 253-267. Springer, (2008)A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems., и . MESAS, том 8906 из Lecture Notes in Computer Science, стр. 77-94. Springer, (2014)Improving authentication of remote card transactions with mobile personal trusted devices., и . Comput. Commun., 30 (8): 1697-1712 (2007)Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi-Agent Systems., , , , и . CASE, стр. 454-459. IEEE, (2007)Protected pointers in wireless sensor networks., и . Int. J. Ad Hoc Ubiquitous Comput., 24 (3): 204-212 (2017)Decentralized intrusion detection for secure cooperative multi-agent systems., , , , и . CDC, стр. 1553-1558. IEEE, (2007)