From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient and secure threshold-based event validation for VANETs., , , , и . WISEC, стр. 163-174. ACM, (2011)Mobile user location-specific encryption (MULE): using your office as your password., и . WISEC, стр. 151-162. ACM, (2010)Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes., , , и . SenSys, стр. 233-246. ACM, (2007)Efficient security primitives derived from a secure aggregation algorithm., и . ACM Conference on Computer and Communications Security, стр. 521-534. ACM, (2008)OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms., , , , , и . ACM Conference on Computer and Communications Security, стр. 13-24. ACM, (2013)STRIDE: sanctuary trail - refuge from internet DDoS entrapment., , , , , , и . AsiaCCS, стр. 415-426. ACM, (2013)Towards Sustainable Evolution for the TLS Public-Key Infrastructure., , , и . AsiaCCS, стр. 637-649. ACM, (2018)The Coremelt Attack., и . ESORICS, том 5789 из Lecture Notes in Computer Science, стр. 37-52. Springer, (2009)Ariadne: a secure on-demand routing protocol for ad hoc networks., , и . MobiCom, стр. 12-23. ACM, (2002)The sybil attack in sensor networks: analysis & defenses., , , и . IPSN, стр. 259-268. ACM, (2004)