From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Money Conservation via Atomicity in Fair Off-Line E-Cash., , , и . ISW, том 1729 из Lecture Notes in Computer Science, стр. 14-31. Springer, (1999)A Trust Management Model for Virtual Communities., , , , и . CIT, стр. 741-745. IEEE Computer Society, (2005)Friendly Observers Ease Off-Line E-Cash., , и . CARDIS, том 180 из IFIP Conference Proceedings, стр. 3-18. Kluwer, (2000)A Novel Rate Limit Algorithm Against Meek DDoS Attacks., , , и . ATC, том 4158 из Lecture Notes in Computer Science, стр. 467-476. Springer, (2006)A Distributed-Log-based IP Traceback Scheme to Defeat DDoS Attacks., , , , и . AINA (2), стр. 25-32. IEEE Computer Society, (2006)An Improved Approach to Access Graph Generation., , и . CIS (1), стр. 447-452. IEEE Computer Society, (2008)Distributed-Log-based Scheme for IP Traceback., , , и . CIT, стр. 711-715. IEEE Computer Society, (2005)Access Graph to Analyze Network Vulnerabilities., , и . PACIIA (2), стр. 781-786. IEEE Computer Society, (2008)978-0-7695-3490-9.Access Graph Based Risk Assessment Model for Network Information System., , и . FCST, стр. 42-48. IEEE Computer Society, (2008)O2-DN: An Overlay-based Distributed Rate Limit Framework to Defeat DDoS Attacks., , , и . ICN/ICONS/MCL, стр. 79. IEEE Computer Society, (2006)