From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Analysis and Design for TAGA: a Touch and Go Assistant in the Aerospace Domain., , и . CoRR, (2020)On Plain and Hereditary History-Preserving Bisimulation., и . MFCS, том 1672 из Lecture Notes in Computer Science, стр. 354-365. Springer, (1999)Adding Branching to the Strand Space Model.. EXPRESS, том 242 из Electronic Notes in Theoretical Computer Science, стр. 139-159. Elsevier, (2008)Analyzing the Capabilities of the CAN Attacker., и . ESORICS (1), том 10492 из Lecture Notes in Computer Science, стр. 464-482. Springer, (2017)Leakiness is Decidable for Well-Founded Protocols.. POST, том 9036 из Lecture Notes in Computer Science, стр. 176-195. Springer, (2015)Concepts and Proofs for Configuring PKCS#11., и . Formal Aspects in Security and Trust, том 7140 из Lecture Notes in Computer Science, стр. 131-147. Springer, (2011)Normed Processes, Unique Decomposition, and Complexity of Bisimulation Equivalences., и . INFINITY, том 239 из Electronic Notes in Theoretical Computer Science, стр. 17-42. Elsevier, (2009)Permissioned Blockchain for Data Provenance in Scientific Data Management., , и . Wirtschaftsinformatik, AISeL, (2021)Analyzing the impact of injected sensor data on an Advanced Driver Assistance System using the OP2TIMUS prototyping platform., , и . DATE, стр. 523-526. IEEE, (2016)Misbehavior detection system in VANETs using local traffic density., и . VNC, стр. 1-4. IEEE, (2018)