From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)., , , , и . KiVS, стр. 225-236. Springer, (2007)Protecting TLS-SA implementations for the challenge-response feature of EMV-CAP against challenge collision attacks., и . Secur. Commun. Networks, 1 (2): 125-134 (2008)SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle., , и . Comput. Commun., 29 (12): 2238-2246 (2006)Reducing the Cost of Security in Link-State Routing, , и . The Proceedings of the 1997 Symposium on Network and Distributed System Security, 1 (1): 1-7 (1997)Robust and Secure Password and Key Change Method., , , , и . ESORICS, том 875 из Lecture Notes in Computer Science, стр. 107-122. Springer, (1994)Verification and Modelling of Authentication Protocols., и . ESORICS, том 648 из Lecture Notes in Computer Science, стр. 141-154. Springer, (1992)Does Licensing Require New Access Control Techniques?. ACM Conference on Computer and Communications Security, стр. 1-8. ACM, (1993)Reducing the Cost of Security in Link-State Routing., , и . NDSS, стр. 93-101. IEEE Computer Society, (1997)Reducing the Proliferation of Passwords in Distributed Systems., и . IFIP Congress (2), том A-13 из IFIP Transactions, стр. 525-531. North-Holland, (1992)