From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Masquerade mimicry attack detection: A randomised approach., и . Comput. Secur., 30 (5): 297-310 (2011)Modelling Uncertain and Time-Dependent Security Labels in MLS Systems., , , , , , и . ICETE (Selected Papers), том 222 из Communications in Computer and Information Science, стр. 158-171. Springer, (2010)Risk based Access Control with Uncertain and Time-dependent Sensitivity., , , , , , и . SECRYPT, стр. 5-13. SciTePress, (2010)Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals., , , и . Entropy, 20 (2): 94 (2018)Bypassing information leakage protection with trusted applications., , , и . Comput. Secur., 31 (4): 557-568 (2012)Information-Theoretic Detection of Masquerade Mimicry Attacks., и . NSS, стр. 183-190. IEEE Computer Society, (2010)Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol., , , , и . IPDPS, стр. 1-5. IEEE, (2009)Fine-Grained Timing Using Genetic Programming., , , и . EuroGP, том 6021 из Lecture Notes in Computer Science, стр. 325-336. Springer, (2010)Two RFID Standard-based Security Protocols for Healthcare Environments., , , и . J. Medical Systems, 37 (5): 9962 (2013)Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6"., , , и . IEEE Communications Letters, 17 (4): 805-807 (2013)