From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Polyinstantiation Integrity in Multilevel Relations Revisited., и . DBSec, стр. 297-308. North-Holland, (1990)Securely sharing neuroimagery., , , , , и . CIKM, стр. 375-377. ACM, (2003)Efficient and secure keys management for wireless mobile communications., , и . POMC, стр. 66-73. ACM, (2002)Redirection policies for mission-based information sharing., , и . SACMAT, стр. 210-218. ACM, (2006)A robust watermarking system based on SVD compression., , , и . SAC, стр. 1341-1347. ACM, (2006)Rule-Based Topological Vulnerability Analysis., , и . MMM-ACNS, том 3685 из Lecture Notes in Computer Science, стр. 23-37. Springer, (2005)Precisely Answering Multi-dimensional Range Queries without Privacy Breaches., , , и . ESORICS, том 2808 из Lecture Notes in Computer Science, стр. 100-115. Springer, (2003)An Authorization Model for a Distributed Hypertext System., , и . IEEE Trans. Knowl. Data Eng., 8 (4): 555-562 (1996)Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast., , и . Networked Group Communication, том 2816 из Lecture Notes in Computer Science, стр. 107-118. Springer, (2003)Preventing Interval-Based Inference by Random Data Perturbation., , и . Privacy Enhancing Technologies, том 2482 из Lecture Notes in Computer Science, стр. 160-170. Springer, (2002)