From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Bitfrost: the one laptop per child security model., и . SOUPS, том 229 из ACM International Conference Proceeding Series, стр. 132-142. ACM, (2007)Enabling Email Confidentiality through the use of Opportunistic Encryption.. DG.O, Digital Government Research Center, (2003)Johnny 2: a user test of key continuity management with S/MIME and Outlook Express., и . SOUPS, том 93 из ACM International Conference Proceeding Series, стр. 13-24. ACM, (2005)Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce., , , , и . Financial Cryptography, том 3570 из Lecture Notes in Computer Science, стр. 188-202. Springer, (2005)SIGINFO: Everything Is a Punch Card.. login Usenix Mag., (2020)Programming Unicode.. login Usenix Mag., (2012)Language translation for file paths., , и . Digit. Investig., 10 (Supplement): S78-S86 (2013)Picking up the trash: Exploiting generational GC for memory analysis., , и . Digit. Investig., (2017)Building Cocoa applications - a step-by-step guide., и . O'Reilly, (2002)The 2010 Census Confidentiality Protections Failed, Here's How and Why., , , , , , , , , и 4 other автор(ы). CoRR, (2023)