From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Relay-Proof Channels Using UWB Lasers., , , и . Security Protocols Workshop, том 7061 из Lecture Notes in Computer Science, стр. 45-46. Springer, (2010)Multi-channel Protocols., и . Security Protocols Workshop, том 4631 из Lecture Notes in Computer Science, стр. 112-127. Springer, (2005)It's the Anthropology, Stupid!, и . Security Protocols Workshop, том 7061 из Lecture Notes in Computer Science, стр. 127-130. Springer, (2010)User Authentication for the Internet of Things., и . Security Protocols Workshop, том 11286 из Lecture Notes in Computer Science, стр. 209-213. Springer, (2018)Red Button and Yellow Button: Usable Security for Lost Security Tokens., , , и . Security Protocols Workshop, том 10368 из Lecture Notes in Computer Science, стр. 165-171. Springer, (2016)Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper)., , и . ICUCT, том 4412 из Lecture Notes in Computer Science, стр. 263-272. Springer, (2006)Security Issues in Ubiquitous Computing.. Handbook of Ambient Intelligence and Smart Environments, Springer, (2010)IEEE Euro S&P: The Younger Sibling Across the Pond Following in Oakland's Footsteps., и . IEEE Secur. Priv., 18 (3): 6-7 (2020)Python in Education: Raising a Generation of Native Speakers. Proceedings of 8$^th$ International Python Conference, (января 2000)http://www.python.org/workshops/2000-01/proceedings/ papers/stajano/stajano.html http://www.uk.research.att.com/~fms/ http://www.uk.research.att.com/ papers/tr.1999.10.html.The Resurrecting Duckling - What Next? (Transcript of Discussion).. Security Protocols Workshop, том 2133 из Lecture Notes in Computer Science, стр. 215-222. Springer, (2000)