From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Auditing against Impossible Abstractions.. Security Protocols Workshop, том 1796 из Lecture Notes in Computer Science, стр. 60-64. Springer, (1999)Delegation and Not-So Smart Card (Transcript of Discussion).. Security Protocols Workshop, том 1550 из Lecture Notes in Computer Science, стр. 158-167. Springer, (1998)Reducing the Branch Power Cost in Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation., , , и . Asia-Pacific Computer Systems Architecture Conference, том 4186 из Lecture Notes in Computer Science, стр. 366-372. Springer, (2006)The Challenges of Efficient Code-Generation for Massively Parallel Architectures., , , и . Asia-Pacific Computer Systems Architecture Conference, том 4186 из Lecture Notes in Computer Science, стр. 416-422. Springer, (2006)Pico Without Public Keys., , , , , , и . Security Protocols Workshop, том 9379 из Lecture Notes in Computer Science, стр. 195-211. Springer, (2015)Trust*: Using Local Guarantees to Extend the Reach of Trust., , и . Security Protocols Workshop, том 7028 из Lecture Notes in Computer Science, стр. 171-178. Springer, (2009)Secure Sessions from Weak Secrets., , и . Security Protocols Workshop, том 3364 из Lecture Notes in Computer Science, стр. 190-205. Springer, (2003)Security Protocol Deployment Risk (Transcript of Discussion).. Security Protocols Workshop, том 6615 из Lecture Notes in Computer Science, стр. 21-24. Springer, (2008)Guarantor and reputation based trust model for Social Internet of Things., , и . IWCMC, стр. 600-605. IEEE, (2015)Analysis of DoS attacks at MAC Layer in mobile adhoc networks., , и . IWCMC, стр. 811-816. IEEE, (2015)