From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy of encrypted voice-over-IP., и . SMC, стр. 3063-3068. IEEE, (2007)On localization attacks to Internet Threat Monitors: An information-theoretic framework., , , , и . DSN, стр. 356-365. IEEE Computer Society, (2008)Endpoint Admission Control: Network Based Approach., и . ICDCS, стр. 227-235. IEEE Computer Society, (2001)Dynamic Resource Allocation Migration for Multiparty Real-Time Communications., и . ICDCS, стр. 646-656. IEEE Computer Society, (1996)Subversion Impedance in Covert Communication Networks., и . TrustCom, стр. 458-465. IEEE Computer Society, (2012)Breathe-to-Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices., , и . WISEC, стр. 188-200. ACM, (2022)Response Time Analysis for Distributed Real-Time Systems with Bursty Job Arrivals., , и . ICPP, стр. 432-440. IEEE Computer Society, (1998)New Delay Analysis in High Speed Networks., , и . ICPP, стр. 454-461. IEEE Computer Society, (1999)Aggregated Aggressiveness Control on Groups of TCP Flows., и . NETWORKING, том 3462 из Lecture Notes in Computer Science, стр. 586-597. Springer, (2005)A Security Architecture for Tenet Scheme 2., , , и . IDMS, том 1045 из Lecture Notes in Computer Science, стр. 163-174. Springer, (1996)