From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

AGVI - Automatic Generation, Verification, and Implementation of Security Protocols., , и . CAV, том 2102 из Lecture Notes in Computer Science, стр. 241-245. Springer, (2001)Design space and analysis of worm defense strategies., , , и . AsiaCCS, стр. 125-137. ACM, (2006)Athena: A New Efficient Automatic Checker for Security Protocol Analysis.. CSFW, стр. 192-202. IEEE Computer Society, (1999)Replayer: automatic protocol replay by binary analysis., , , и . CCS, стр. 311-321. ACM, (2006)The sybil attack in sensor networks: analysis & defenses., , , и . IPSN, стр. 259-268. ACM, (2004)Latent Attention For If-Then Program Synthesis., , , , и . NIPS, стр. 4574-4582. (2016)Efficient and Secure Source Authentication for Multicast., , , и . NDSS, The Internet Society, (2001)Expander Graphs for Digital Stream Authentication and Robust Overlay Networks., , и . S&P, стр. 258-270. IEEE Computer Society, (2002)BinHunt: Automatically Finding Semantic Differences in Binary Programs., , и . ICICS, том 5308 из Lecture Notes in Computer Science, стр. 238-255. Springer, (2008)Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds., , и . RAID, том 3224 из Lecture Notes in Computer Science, стр. 258-277. Springer, (2004)