From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Two-phase Nonrepudiation Protocols., , и . ICCCNT, стр. 22:1-22:8. ACM, (2016)The Implication Problem of Computing Policies., , , , и . SSS, том 9212 из Lecture Notes in Computer Science, стр. 109-123. Springer, (2015)Scalable Malware Clustering using Multi-Stage Tree Parallelization., , и . ISI, стр. 1-6. IEEE, (2020)An Evaluation of Malware Triage Similarity Hashes., , , и . ICEIS (1), стр. 431-435. SCITEPRESS, (2023)Nonrepudiation Protocols in Cloud Systems., и . ICCCNT, стр. 23:1-23:6. ACM, (2016)Nonrepudiation Protocols Without a Trusted Party., , и . NETYS, том 9944 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2016)HAC-T and Fast Search for Similarity in Security., , и . COINS, стр. 1-7. IEEE, (2020)