From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

In Certificates We Trust - Revisited., , и . TrustCom/BigDataSE/ISPA (1), стр. 702-709. IEEE, (2015)The Net Rat - Rethinking Connected Services for Increased Security., , и . SECRYPT, стр. 375-383. SciTePress, (2017)Balancing Utility and Security: Securing Cloud Federations of Public Entities., , , , и . OTM Conferences, том 10033 из Lecture Notes in Computer Science, стр. 943-961. (2016)Armored Twins: Flexible Privacy Protection for Digital Twins through Conditional Proxy Re-Encryption and Multi-Party Computation., и . SECRYPT, стр. 149-160. SCITEPRESS, (2021)Applied dynamic policy selection., , , и . CNS, стр. 507-515. IEEE, (2016)Multiply, Divide, and Conquer - Making Fully Decentralised Access Control a Reality., , и . NSS, том 12570 из Lecture Notes in Computer Science, стр. 311-326. Springer, (2020)Total Eclipse of the Heart - Disrupting the InterPlanetary File System., , и . USENIX Security Symposium, стр. 3735-3752. USENIX Association, (2022)Fides: Unleashing the Full Potential of Remote Attestation., , и . ICETE (2), стр. 314-321. SciTePress, (2019)SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform., , , и . ICISS, том 11281 из Lecture Notes in Computer Science, стр. 345-363. Springer, (2018)Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases., , и . CCGrid, стр. 935-944. IEEE Computer Society / ACM, (2017)