From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Robustness and Security in a Mobile-Agent Based Network Monitoring System., , , , , , , и . ICAC, стр. 320-321. IEEE Computer Society, (2004)Timed-Release and Key-Insulated Public Key Encryption., , , и . Financial Cryptography, том 4107 из Lecture Notes in Computer Science, стр. 191-205. Springer, (2006)Combating Double-Spending Using Cooperative P2P Systems., , , и . ICDCS, стр. 41. IEEE Computer Society, (2007)Characterizing Botnets from Email Spam Records., , , , , и . LEET, USENIX Association, (2008)Spamming botnets: signatures and characteristics., , , , , и . SIGCOMM, стр. 171-182. ACM, (2008)Robust Accounting in Decentralized P2P Storage Systems., , и . ICDCS, стр. 14. IEEE Computer Society, (2006)