From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Adaptative Encryption for Ubiquitous Environments., , , и . ICCSA (2), том 4706 из Lecture Notes in Computer Science, стр. 540-548. Springer, (2007)Improving security information gathering with IEEE 802.21 to optimize handover performance., и . MSWiM, стр. 96-105. ACM, (2009)Nationwide Safety: Nationwide Modeling for Broadband Network Services., , , , , и . IEEE Veh. Technol. Mag., 8 (2): 83-91 (2013)Towards self-authenticable smart cards., , , и . Comput. Commun., 29 (15): 2781-2787 (2006)Measuring the resiliency of cellular base station deployments., , , и . WCNC, стр. 1625-1630. IEEE, (2015)Survey of Attacks and Defenses on P2PSIP Communications., , , и . IEEE Commun. Surv. Tutorials, 14 (3): 750-783 (2012)New E-Payment Scenarios in an Extended Version of the Traditional Model., , , и . ICCSA (2), том 5073 из Lecture Notes in Computer Science, стр. 514-525. Springer, (2008)A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol., , , и . ICCSA (4), том 3483 из Lecture Notes in Computer Science, стр. 1309-1318. Springer, (2005)Security Issues in Network File Systems., , , и . ICCSA (1), том 3043 из Lecture Notes in Computer Science, стр. 812-820. Springer, (2004)Secure Communications in Multi-Agent Systems Protecting KQML., , , и . WOSIS, стр. 305-313. INSTICC Press, (2004)