From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Vickrey Auctions without a Trusted Third Party., , и . SEC, том 250 из IFIP Conference Proceedings, стр. 337-348. Kluwer, (2003)On Securely Scheduling a Meeting., , , , , и . SEC, том 193 из IFIP Conference Proceedings, стр. 183-198. Kluwer, (2001)Securing RMI Communication., , и . Network Security, том 206 из IFIP Conference Proceedings, стр. 93-105. Kluwer, (2001)Security Through Aspect-Oriented Programming., , и . Network Security, том 206 из IFIP Conference Proceedings, стр. 125-138. Kluwer, (2001)Assessment of Palm OS Susceptibility to Malicious Code Threats., , , и . Communications and Multimedia Security, том 3677 из Lecture Notes in Computer Science, стр. 240-249. Springer, (2005)A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning., , , и . Communications and Multimedia Security, том 7025 из Lecture Notes in Computer Science, стр. 163-170. Springer, (2011)Privacy Preserving Mechanisms for a Pervasive eHealth System., , , и . PrimeLife, том 375 из IFIP Advances in Information and Communication Technology, стр. 221-231. Springer, (2011)Privacy in Commercial Medical Storage Systems., , и . eHealth, том 69 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 247-258. Springer, (2010)Flexible and Time-Based Anonymous Access Restrictions., и . ICETE (Selected Papers), том 130 из Communications in Computer and Information Science, стр. 237-250. Springer, (2009)Designing Privacy-Enhancing Mobile Applications., , и . PrimeLife, том 375 из IFIP Advances in Information and Communication Technology, стр. 157-170. Springer, (2011)