From post

Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions.

, , , , , , , , и . Secure and Trustworthy Service Composition, том 8900 из Lecture Notes in Computer Science, Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Customer Choice in a Multi-Service Residential Access Network Environment., , , , , и . EUROMICRO, стр. 216-. IEEE Computer Society, (2002)Evaluation of a DTN convergence layer for the AX.25 network protocol., , и . MobiOpp, стр. 72-78. ACM, (2010)Authentication Issues in Multi-service Residential Access Networks., , и . MMNS, том 2839 из Lecture Notes in Computer Science, стр. 381-395. Springer, (2003)Xen Installation and Configuration., и . login Usenix Mag., (2007)An Empirical Evaluation of a Shim6 Implementation., и . MONAMI, том 68 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 62-70. Springer, (2010)On the use of SHIM6 for mobility support in IMS networks., , , и . TRIDENTCOM, стр. 40. ICST, (2008)Implementation and evaluation of the Shim6 protocol in the Linux kernel., , и . Comput. Commun., 34 (14): 1685-1695 (2011)