From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Bayesian Analysis of Secure P2P Sharing Protocols., , , и . OTM Conferences (2), том 4804 из Lecture Notes in Computer Science, стр. 1701-1717. Springer, (2007)A Multi-party Rational Exchange Protocol., , , и . OTM Workshops (1), том 4805 из Lecture Notes in Computer Science, стр. 42-43. Springer, (2007)Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags., , , и . SECPerU, стр. 55-60. IEEE Computer Society, (2007)Security in P2P Networks: Survey and Research Directions., , , и . EUC Workshops, том 4097 из Lecture Notes in Computer Science, стр. 183-192. Springer, (2006)LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification., , , и . Comput. Stand. Interfaces, 31 (1): 88-97 (2009)Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol., , , и . RFIDSec, том 6370 из Lecture Notes in Computer Science, стр. 22-34. Springer, (2010)N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer., , и . ICCSA (1), том 3043 из Lecture Notes in Computer Science, стр. 841-850. Springer, (2004)Framework Proposal to Measure the Stress as Adversarial Factor on Cyber Decision Making., , и . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, том 13106 из Lecture Notes in Computer Science, стр. 517-536. Springer, (2021)Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol., , и . MCO, том 14 из Communications in Computer and Information Science, стр. 589-596. Springer, (2008)The Emergence of Cyber-Terrorism.. IEEE Distributed Syst. Online, (2004)