From post

A Causality-Based Model for Describing the Trustworthiness of a Computing Device.

, и . INTRUST, том 9565 из Lecture Notes in Computer Science, стр. 130-149. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Introduction to the TPM.. Smart Cards, Tokens, Security and Applications, 2nd Ed., Springer, (2017)Security for Video Broadcasting., и . Smart Cards, Tokens, Security and Applications, 2nd Ed., Springer, (2017)A Causality-Based Model for Describing the Trustworthiness of a Computing Device., и . INTRUST, том 9565 из Lecture Notes in Computer Science, стр. 130-149. Springer, (2015)Intrusion Detection in Robotic Swarms., и . IntelliSys (2), том 1038 из Advances in Intelligent Systems and Computing, стр. 968-980. Springer, (2019)Designing & verifying secure protocols of the digital marketplace., , , и . ISWCS, стр. 86-90. IEEE, (2005)Analysis Of Electronic Voting Schemes In The Real World., и . UKAIS, стр. 14. (2018)Review of Potential Attacks on Robotic Swarms., и . IntelliSys (2), том 16 из Lecture Notes in Networks and Systems, стр. 628-646. Springer, (2016)Mutual Authentication in Electronic Voting Schemes., и . PST, стр. 1-2. IEEE Computer Society, (2018)