From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Friendly Observers Ease Off-Line E-Cash., , и . CARDIS, том 180 из IFIP Conference Proceedings, стр. 3-18. Kluwer, (2000)Non-interactive editable signatures for assured data provenance., и . CODASPY, стр. 145-156. ACM, (2011)SocialClouds: Concept, Security Architecture and Some Mechanisms., и . INTRUST, том 6163 из Lecture Notes in Computer Science, стр. 104-128. Springer, (2009)A Characterization of Cybersecurity Posture from Network Telescope Data., , и . INTRUST, том 9473 из Lecture Notes in Computer Science, стр. 105-126. Springer, (2014)An Access Control Language for a General Provenance Model., , , , и . Secure Data Management, том 5776 из Lecture Notes in Computer Science, стр. 68-88. Springer, (2009)Constructing Disjoint Paths for Secure Communication., , , и . DISC, том 2848 из Lecture Notes in Computer Science, стр. 181-195. Springer, (2003)How to Secure Your Email Address Book and Beyond., , и . CANS, том 4856 из Lecture Notes in Computer Science, стр. 228-246. Springer, (2007)VABKS: Verifiable attribute-based keyword search over outsourced encrypted data., , и . INFOCOM, стр. 522-530. IEEE, (2014)A Case Study on using Deep Learning for Network Intrusion Detection., и . MILCOM, стр. 1-6. IEEE, (2019)Computational complexity characterization of protecting elections from bribery., , , , , , , и . Theor. Comput. Sci., (2021)