From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards an Effective Wireless Security Policy for Sensitive Organizations., , , и . ISI, том 3495 из Lecture Notes in Computer Science, стр. 629-630. Springer, (2005)