From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Inter-FSP Funds Transfer Protocol., и . IACR Cryptology ePrint Archive, (2013)Folklore, Practice and Theory of Robust Combiners.. IACR Cryptology ePrint Archive, (2002)Fragmentation Considered Vulnerable., и . ACM Trans. Inf. Syst. Secur., 15 (4): 16:1-16:31 (2013)TCP Ack Storm DoS Attacks., и . SEC, том 354 из IFIP Advances in Information and Communication Technology, стр. 29-40. Springer, (2011)Securing the Internet (Abstract)., , , и . PODC, стр. 257. ACM, (1995)Cross-Site Framing Attacks., , и . ACSAC, стр. 161-170. ACM, (2015)Cryptographic Protocols to Prevent Spam.. IACR Cryptology ePrint Archive, (2005)Forcing Johnny to Login Safely - Long-Term User Study of Forcing and Training Login Mechanisms., и . ESORICS, том 6879 из Lecture Notes in Computer Science, стр. 452-471. Springer, (2011)Lightweight Opportunistic Tunneling (LOT)., и . ESORICS, том 5789 из Lecture Notes in Computer Science, стр. 104-119. Springer, (2009)Securing the Net: Challenges, Failures and Directions.. DISC, том 3724 из Lecture Notes in Computer Science, стр. 2. Springer, (2005)