From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Forcing Johnny to login safely., и . Journal of Computer Security, 21 (3): 393-424 (2013)The chatty-sensor: a provably-covert channel in cyber physical systems., и . ACSAC, стр. 638-649. ACM, (2019)Untraceable mobility or how to travel incognito., , , и . Comput. Networks, 31 (8): 871-884 (1999)Surf'N'Sign: Client Signatures on Web Documents., и . IBM Syst. J., 37 (1): 61-71 (1998)Safeguarding Digital Library Contents: Charging for Online Content.. D Lib Mag., (1998)Gossip Latin square and the meet-all gossipers problem., и . Inf. Process. Lett., 115 (10): 738-743 (2015)TCP Ack Storm DoS Attacks., и . SEC, том 354 из IFIP Advances in Information and Communication Technology, стр. 29-40. Springer, (2011)Cryptographic Protocols to Prevent Spam.. IACR Cryptology ePrint Archive, (2005)Inter-FSP Funds Transfer Protocol., и . IACR Cryptology ePrint Archive, (2013)Folklore, Practice and Theory of Robust Combiners.. IACR Cryptology ePrint Archive, (2002)