From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Framework for the User-Oriented Personal Information Protection., и . Security and Management, стр. 12-19. CSREA Press, (2006)Cyberbullying detection using parent-child relationship between comments., , , и . iiWAS, стр. 325-334. ACM, (2016)Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection., и . Information Hiding, том 1174 из Lecture Notes in Computer Science, стр. 257-264. Springer, (1996)Evasion Attacks Against Statistical Code Obfuscation Detectors., , и . IWSEC, том 10418 из Lecture Notes in Computer Science, стр. 121-137. Springer, (2017)Single-Path Authenticated-Encryption Scheme Based on Universal Hashing., и . Selected Areas in Cryptography, том 2595 из Lecture Notes in Computer Science, стр. 94-109. Springer, (2002)Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System., , , , и . PRIMA, том 5044 из Lecture Notes in Computer Science, стр. 134-145. Springer, (2007)Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols., , и . STACS, том 1373 из Lecture Notes in Computer Science, стр. 511-521. Springer, (1998)Design and Implementation of Document Access Control Model Based on Role and Security Policy., , , и . INTRUST, том 6802 из Lecture Notes in Computer Science, стр. 26-36. Springer, (2010)One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange., , и . Communications and Multimedia Security, том 4237 из Lecture Notes in Computer Science, стр. 87-96. Springer, (2006)Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks., , и . INTRUST, том 7222 из Lecture Notes in Computer Science, стр. 239-257. Springer, (2011)