From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Formal Security Design Approach for Transformation of Authorizations in Information Systems., и . PACIS, стр. 81. AISeL, (1997)A Controller Agent Model to Counteract DoS Attacks in Multiple Domains., и . Integrated Network Management, том 246 из IFIP Conference Proceedings, стр. 113-116. Kluwer, (2003)Improving Software Security Through an Integrated Approach., , и . SECRYPT, стр. 437-442. INSTICC Press, (2006)A novel dynamic key management scheme for secure multicasting., , и . ICON, стр. 391-395. IEEE, (2003)A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks., , , , и . MobiQuitous, том 73 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 186-197. Springer, (2010)Towards a Generic Logic for Analysing Network Protocols., , и . ICDCS Workshop on Internet, стр. A19-A26. (2000)Analysis of traceback techniques., и . ACSW, том 54 из CRPIT, стр. 115-124. Australian Computer Society, (2006)Integration of Graph Based Authorization Policies., и . ISMIS, том 4203 из Lecture Notes in Computer Science, стр. 359-368. Springer, (2006)Authorization and Trust Enhanced Security for Distributed Applications.. ICISS, том 3803 из Lecture Notes in Computer Science, стр. 1-20. Springer, (2005)Trapdoor Rings and Their Use in Cryptography.. CRYPTO, том 218 из Lecture Notes in Computer Science, стр. 369-395. Springer, (1985)