From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An active network approach to virtual private networks., , , , и . ISCC, стр. 502-507. IEEE Computer Society, (2002)Jattack: a WebRTC load testing tool., , , и . IPTComm, стр. 1-6. IEEE, (2016)Pinball Caching: Improving Performance of a Framework for Dynamic Web-Content Adaptation and Deliver., , и . ISCC, стр. 768-773. IEEE Computer Society, (2006)Exploiting the MIL-STD-1553 avionic data bus with an active cyber device., , , и . Comput. Secur., (2021)An Engineering Approach to QoS Provisioning over the Internet., , и . ECMAST, том 1629 из Lecture Notes in Computer Science, стр. 229-245. Springer, (1999)Thalos: Secure File Storage in Untrusted Clouds., и . FNSS, том 878 из Communications in Computer and Information Science, стр. 178-192. Springer, (2018)WebAssembly and Security: a review., и . CoRR, (2024)Chirotonia: A Scalable and Secure e-Voting Framework based on Blockchains and Linkable Ring Signatures., , , и . Blockchain, стр. 417-424. IEEE, (2021)Sniping at web applications to discover input-handling vulnerabilities., , и . J. Comput. Virol. Hacking Tech., 20 (4): 641-667 (ноября 2024)Measuring Janus temperature in ICE-land., , , , и . IPTComm, стр. 1-7. IEEE, (2018)