From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Implication in Virtualization., , , и . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service., , , и . IMCOM, стр. 62:1-62:5. ACM, (2016)Security management in Wireless Sensor Networks for healthcare., , , и . Int. J. Mob. Commun., 9 (2): 187-207 (2011)Preface to KOCSEA Special Issue., , , , и . J. Comput. Sci. Eng., 6 (4): 279-279 (2012)The design and evaluation of a virtual world-based learning environment: information security learning using Second Life., , , и . DESRIST, ACM, (2009)A stakeholder-oriented assessment index for cloud security auditing., , , и . IMCOM, стр. 55:1-55:7. ACM, (2015)Building Sustainable Software by Preemptive Architectural Design Using Tactic-Equipped Patterns., , и . ARES, стр. 484-489. IEEE Computer Society, (2014)Vulnerability-Based Security Pattern Categorization in Search of Missing Patterns., , и . ARES, стр. 476-483. IEEE Computer Society, (2014)Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with HIPAA (Work-in-Progress)., , и . ICSSA, стр. 34-37. IEEE, (2018)Computing Security Scores for IoT Device Vulnerabilities., , и . ICSSA, стр. 52-59. IEEE, (2019)