From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Formal Verification of Cardholder Registration in SET., , , и . ESORICS, том 1895 из Lecture Notes in Computer Science, стр. 159-174. Springer, (2000)Lack of Explicitness Strikes Back.. Security Protocols Workshop, том 2133 из Lecture Notes in Computer Science, стр. 87-93. Springer, (2000)The VOCODES Kill Chain for Voice Controllable Devices., , и . ESORICS Workshops (2), том 14399 из Lecture Notes in Computer Science, стр. 176-197. Springer, (2023)A Secure Exam Protocol Without Trusted Parties., , , и . SEC, том 455 из IFIP Advances in Information and Communication Technology, стр. 495-509. Springer, (2015)Implementing CAN bus security by TOUCAN., , , и . MobiHoc, стр. 399-400. ACM, (2019)Soft Constraint Programming to Analysing Security Protocols., и . Theory Pract. Log. Program., 4 (5-6): 545-572 (2004)Layered Analysis of Security Ceremonies., и . SEC, том 376 из IFIP Advances in Information and Communication Technology, стр. 273-286. Springer, (2012)Formal Analysis of the Genetic Toggle., и . CMSB, том 5688 из Lecture Notes in Computer Science, стр. 96-110. Springer, (2009)PETIoT: PEnetration Testing the Internet of Things., , , и . CoRR, (2023)Analysing Privacy Analyses., , и . ITASEC, том 1816 из CEUR Workshop Proceedings, стр. 19-28. CEUR-WS.org, (2017)