From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Diagnosability of Nested Intruders.. BIONETICS, том 87 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 92-99. Springer, (2010)Network Information Flow.. Fundam. Informaticae, 72 (1-3): 167-180 (2006)Probabilistic Information Flow Security.. Fundam. Informaticae, 85 (1-4): 173-187 (2008)Process Algebra Contexts and Security Properties.. Fundam. Informaticae, 102 (1): 63-76 (2010)Security and time insertion.. PCI, стр. 154-157. ACM, (2019)Information Flow and Concurrent Imperative Languages.. CS&P, том 928 из CEUR Workshop Proceedings, стр. 123-134. CEUR-WS.org, (2012)Process Opacity and Insertion Functions., и . CS&P, том 2951 из CEUR Workshop Proceedings, стр. 83-92. CEUR-WS.org, (2021)Differential Privacy and Security.. CS&P, том 1269 из CEUR Workshop Proceedings, стр. 80-91. CEUR-WS.org, (2014)Reversible Attack Trees., и . UEMCON, стр. 279-285. IEEE, (2021)Real-Time Communication Networks.. NATO ASI RTC, том 127 из NATO ASI Series, стр. 691. Springer, (1992)