From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling., и . Financial Cryptography, том 3570 из Lecture Notes in Computer Science, стр. 31-43. Springer, (2005)Research Directions for Automated Software Verification: Using Trusted Hardware., и . ASE, стр. 274-279. IEEE Computer Society, (1997)Cryptographic Verification of Test Coverage Claims., и . ESEC / SIGSOFT FSE, том 1301 из Lecture Notes in Computer Science, стр. 395-413. Springer, (1997)Authentic Third-party Data Publication., , , и . DBSec, том 201 из IFIP Conference Proceedings, стр. 101-112. Kluwer, (2000)Secure Distributed Computing in a Commercial Environment., и . Financial Cryptography, том 2339 из Lecture Notes in Computer Science, стр. 279-294. Springer, (2001)Cryptographic Verification of Test Coverage Claims., и . IEEE Trans. Software Eng., 26 (2): 178-192 (2000)Protocol design for integrity protection., и . S&P, стр. 41-53. IEEE Computer Society, (1993)Toward Acceptable Metrics of Authentication., и . S&P, стр. 10-20. IEEE Computer Society, (1997)Flexible authentication of XML documents., , , , , и . CCS, стр. 136-145. ACM, (2001)Certifying Data from Multiple Sources., , и . DBSec, том 142 из IFIP, стр. 47-60. Kluwer/Springer, (2003)