From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Methodological Security Verification of a Registration Protocol., , и . SOCO-CISIS-ICEUTE, том 299 из Advances in Intelligent Systems and Computing, стр. 453-462. Springer, (2014)libgroupsig: An extensible C library for group signatures., , и . IACR Cryptology ePrint Archive, (2015)A formal methodology for integral security design and verification of network protocols, , и . CoRR, (2012)Combining Usability and Privacy Protection in Free-Access Public Cloud Storage Servers: Review of the Main Threats and Challenges., , и . CoRR, (2016)Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers., , , и . Computer and Network Security Essentials, Springer, (2018)Robust dynamical invariants in sequential neural activity, , , , и . Scientific reports, 9 (1): 1--13 (2019)Anonymity revocation through standard infrastructures, , и . European Public Key Infrastructure Workshop, стр. 112--127. Springer, Berlin, Heidelberg, (2012)On the application of compression-based metrics to identifying anomalous behaviour in web traffic, , и . Logic Journal of the IGPL, (2020)Trustworthy humans and machines: Vulnerable trustors and the need for trustees' competence, integrity, and benevolence in digital systems, и . Trust and Transparency in an Age of Surveillance, Lora Anne Viola and Paweł Laidler (Eds.), Routledge, (2022)An approach for adapting moodle into a secure infrastructure, , и . Computational Intelligence in Security for Information Systems, Springer, Berlin, Heidelberg, (2011)