From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Gearing Up: How to Eat Your Cryptocake and Still Have It., и . Security Protocols Workshop, том 7114 из Lecture Notes in Computer Science, стр. 258-259. Springer, (2011)Anonymous Context Based Role Activation Mechanism., , и . Security Protocols Workshop, том 4631 из Lecture Notes in Computer Science, стр. 315-321. Springer, (2005)Concluding Discussion: When Does Confidentiality Harm Security?. Security Protocols Workshop, том 2467 из Lecture Notes in Computer Science, стр. 229-238. Springer, (2001)An evaluation of break-the-glass access control model for medical data in wireless sensor networks., , , и . Healthcom, стр. 130-135. IEEE, (2014)Pictures Can't Lie under Oath., , и . Security Protocols Workshop, том 1796 из Lecture Notes in Computer Science, стр. 208-218. Springer, (1999)Beyond Trust., и . Security Protocols Workshop, том 8809 из Lecture Notes in Computer Science, стр. 340-344. Springer, (2014)Anonymous Context Based Role Activation Mechanism.. Security Protocols Workshop, том 4631 из Lecture Notes in Computer Science, стр. 322-328. Springer, (2005)Trust*: Using Local Guarantees to Extend the Reach of Trust.. Security Protocols Workshop, том 7028 из Lecture Notes in Computer Science, стр. 179-188. Springer, (2009)Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms (Transcript of Discussion).. Security Protocols Workshop, том 2133 из Lecture Notes in Computer Science, стр. 184-193. Springer, (2000)Multi-Channel Key Agreement Using Encrypted Public Key Exchange (Transcript of Discussion).. Security Protocols Workshop, том 5964 из Lecture Notes in Computer Science, стр. 139-146. Springer, (2007)