From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient and secure threshold-based event validation for VANETs., , , , и . WISEC, стр. 163-174. ACM, (2011)Mobile user location-specific encryption (MULE): using your office as your password., и . WISEC, стр. 151-162. ACM, (2010)Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes., , , и . SenSys, стр. 233-246. ACM, (2007)Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure., , , , и . WWW, стр. 679-690. International World Wide Web Conferences Steering Committee / ACM, (2013)The Coremelt Attack., и . ESORICS, том 5789 из Lecture Notes in Computer Science, стр. 37-52. Springer, (2009)AGVI - Automatic Generation, Verification, and Implementation of Security Protocols., , и . CAV, том 2102 из Lecture Notes in Computer Science, стр. 241-245. Springer, (2001)Ariadne: a secure on-demand routing protocol for ad hoc networks., , и . MobiCom, стр. 12-23. ACM, (2002)The sybil attack in sensor networks: analysis & defenses., , , и . IPSN, стр. 259-268. ACM, (2004)MiniSec: a secure sensor network communication architecture., , , и . IPSN, стр. 479-488. ACM, (2007)ACComplice: Location inference using accelerometers on smartphones., , , , и . COMSNETS, стр. 1-9. IEEE, (2012)