From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs., , , , , и . FSKD (2), том 3614 из Lecture Notes in Computer Science, стр. 205-214. Springer, (2005)A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures., , и . ICISC, том 2015 из Lecture Notes in Computer Science, стр. 1-13. Springer, (2000)On Key Distribution and Authentication in Mobile Radio Networks., , , и . EUROCRYPT, том 765 из Lecture Notes in Computer Science, стр. 461-465. Springer, (1993)On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications., , и . CARDIS, (1996)New Public-Key Cryptosystem Using Braid Groups., , , , , и . CRYPTO, том 1880 из Lecture Notes in Computer Science, стр. 166-183. Springer, (2000)An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification., , , , , , и . ICCSA (2), том 3481 из Lecture Notes in Computer Science, стр. 225-234. Springer, (2005)An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction., , , , , и . ICOIN, том 3391 из Lecture Notes in Computer Science, стр. 72-79. Springer, (2005)How to construct balanced Boolean functions with good global avalanche characteristics., , , и . ICISC, стр. 121-130. Korea Institute of Information Security and Cryptology (KIISC), (1998)Efficient Anonymous Channel and All/Nothing Election Scheme., , и . EUROCRYPT, том 765 из Lecture Notes in Computer Science, стр. 248-259. Springer, (1993)The Vulnerabilities Analysis of Fuzzy Vault Using Password., , , , и . FGCN (3: BSBT), стр. 76-83. IEEE Computer Society, (2008)978-0-7695-3431-2.