From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Non-Invasive Methods for Host Certification., , , , и . SecureComm, стр. 1-10. IEEE, (2006)Analysis of security vulnerabilities in the movie production and distribution process., , , , и . Digital Rights Management Workshop, стр. 1-12. ACM, (2003)Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine., , , и . Privacy Enhancing Technologies, том 3424 из Lecture Notes in Computer Science, стр. 314-328. Springer, (2004)From Languages to Systems: Understanding Practical Application Development in Security-typed Languages., , и . ACSAC, стр. 153-164. IEEE Computer Society, (2006)Toward Valley-Free Inter-domain Routing., , и . ICC, стр. 2009-2016. IEEE, (2007)Policy.. Encyclopedia of Cryptography and Security, Springer, (2005)On Attack Causality in Internet-Connected Cellular Networks.. USENIX Security Symposium, USENIX Association, (2007)MICSS: A Realistic Multichannel Secrecy Protocol., и . GLOBECOM, стр. 1-6. IEEE, (2015)Analysis of Communities of Interest in Data Networks., , , , , и . PAM, том 3431 из Lecture Notes in Computer Science, стр. 83-96. Springer, (2005)On context in authorization policy.. SACMAT, стр. 80-89. ACM, (2003)