From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis and Design of E-voting Protocol., , и . SEC, том 175 из IFIP Conference Proceedings, стр. 281-290. Kluwer, (2000)A Way of Key Management in Cloud Storage Based on Trusted Computing., , , и . NPC, том 6985 из Lecture Notes in Computer Science, стр. 135-145. Springer, (2011)A dynamic information flow model of secure systems., и . AsiaCCS, стр. 341-343. ACM, (2007)Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?., , , , , , , , и . Peer-to-Peer Computing, стр. 11-20. IEEE, (2009)Some issues regarding operating system security.. ICIS, стр. 1. IEEE Computer Society, (2014)SecGuard: Secure and Practical Integrity Protection Model for Operating Systems., , , , , и . APWeb, том 6612 из Lecture Notes in Computer Science, стр. 370-375. Springer, (2011)SpamClean: Towards Spam-Free Tagging Systems., , , и . CSE (4), стр. 429-435. IEEE Computer Society, (2009)A hash-TLB approach for MMU virtualization in xen/IA64., , , , , и . IPDPS, стр. 1-8. IEEE, (2008)Winnowing Multihashing Structure with Wildcard Query., , , , и . APWeb Workshophs, том 8710 из Lecture Notes in Computer Science, стр. 265-281. Springer, (2014)A Practical Alternative to Domain and Type Enforcement Integrity Formal Models., и . Inscrypt, том 4318 из Lecture Notes in Computer Science, стр. 225-237. Springer, (2006)