From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators., , и . SEC, том 278 из IFIP, стр. 47-61. Springer, (2008)Secure wireless communication platform for EV-to-Grid research., , , , и . IWCMC, стр. 21-25. ACM, (2010)Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes., и . Inscrypt, том 4318 из Lecture Notes in Computer Science, стр. 264-278. Springer, (2006)Zero-Distortion Authentication Watermarking.. ISC, том 2851 из Lecture Notes in Computer Science, стр. 325-337. Springer, (2003)A Hybrid Scheme for Authenticating Scalable Video Codestreams., , , и . IEEE Trans. Inf. Forensics Secur., 9 (4): 543-553 (2014)An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks., , и . VTC Spring, стр. 831-835. IEEE, (2006)Counterfeiting Attack on a Lossless Authentication Watermarking Scheme., , и . VIP, том 22 из CRPIT, стр. 109-112. Australian Computer Society, (2002)A Trust Answer to Distance Query., , и . WCNC, стр. 2703-2708. IEEE, (2007)Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual Tracking., , , , , , и . IEEE Trans. Inf. Forensics Secur., (2023)Obfuscating Software Puzzle for Denial-of-Service Attack Mitigation., , , и . iThings/GreenCom/CPSCom/SmartData, стр. 115-122. IEEE, (2016)