From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Comparative Literature Review on RFID Security and Privacy., , , и . iiWAS, том 229 из books@ocg.at, стр. 213-222. Austrian Computer Society, (2007)Empirical Research in Information Security.. iiWAS, стр. 4. ACM, (2014)Blending the Sketched Use Case Scenario with License Agreements Using Semantics., , , и . KSEM, том 5914 из Lecture Notes in Computer Science, стр. 275-284. Springer, (2009)Poster: Design of an Anomaly-based Threat Detection & Explication System., , , , и . SACMAT, стр. 119-120. ACM, (2017)Context Oriented Analysis of Web 2.0 Social Network Contents - MindMeister Use-Case., , , , и . ACIIDS (1), том 5990 из Lecture Notes in Computer Science, стр. 180-189. Springer, (2010)Questioning the Need for Separate IT Risk Management Frameworks., , и . GI Jahrestagung (2), том P-176 из LNI, стр. 245-252. GI, (2010)Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse., , и . IRI, стр. 170-176. IEEE Systems, Man, and Cybernetics Society, (2007)Ontological Mapping of Common Criteria's Security Assurance Requirements., , , и . SEC, том 232 из IFIP, стр. 85-95. Springer, (2007)HydRand: Efficient Continuous Distributed Randomness., , , и . SP, стр. 73-89. IEEE, (2020)The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor., и . ESORICS (2), том 9879 из Lecture Notes in Computer Science, стр. 493-511. Springer, (2016)