From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones., и . WISA, том 4298 из Lecture Notes in Computer Science, стр. 225-236. Springer, (2006)A Personal Information Protection Model for Web Applications by Utilizing Mobile Phones., , , и . EJC, том 166 из Frontiers in Artificial Intelligence and Applications, стр. 346-353. IOS Press, (2007)A Security Measure Selection Scheme with Consideration of Potential Lawsuits., , , , , и . Security and Management, стр. 104-110. CSREA Press, (2010)A threat model for security specification in security evaluation by ISO/IEC 19791., и . APNOMS, стр. 1-8. IEEE, (2012)LAN fault management ensemble., , , и . NOMS, стр. 540-551. IEEE, (1996)A method for calculating system similarity for the evaluation of practical accomplishments in person-in-charge allocation support., , и . SoMeT, том 231 из Frontiers in Artificial Intelligence and Applications, стр. 127-140. IOS Press, (2011)Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks., , , , , , , и . HCI (20), том 9750 из Lecture Notes in Computer Science, стр. 77-88. Springer, (2016)A Study on Sensor Multiplicity in Optical Fiber Sensor Networks., , , , , и . AINA, стр. 519-525. IEEE Computer Society, (2010)Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation., , и . CyberSec, стр. 46-51. IEEE Computer Society, (2015)A Study of Security Policy Making Adaptable to Users' Environments Based on International Standards., и . LANOMS, стр. 301-306. UFRGS, (2005)