From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Location and identity privacy for LISP-MN., , , , , и . ICC, стр. 5260-5265. IEEE, (2015)Programmable Overlays via OpenOverlayRouter., , , , , , , , , и 2 other автор(ы). IEEE Commun. Mag., 55 (6): 32-38 (2017)SDN for End-Nodes: Scenario Analysis and Architectural Guidelines., , , , , , и . CoRR, (2018)A Reflection on the Organic Growth of the Internet Protocol Stack., , , и . CoRR, (2022)SD-access: practical experiences in designing and deploying software defined enterprise networks., , , , , , , , , и . CoNEXT, стр. 496-508. ACM, (2020)Non-intrusive authentication., , и . SEC, том 92 из IFIP Conference Proceedings, стр. 440-451. Chapman & Hall, (1997)Securing the Control-plane Channel and Cache of Pull-based ID/LOC Protocols., , , , , , , и . CoRR, (2018)Secure group key management for storage area networks., , , , и . IEEE Commun. Mag., 41 (8): 92-99 (2003)SD-Access: Practical Experiences in Designing and Deploying Software Defined Enterprise Networks., , , , , , , , , и . CoRR, (2020)Secure Group Services for Storage Area Networks., , , и . IEEE Security in Storage Workshop, стр. 80-93. IEEE Computer Society, (2002)