From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A man-in-the-middle attack on UMTS., и . Workshop on Wireless Security, стр. 90-97. ACM, (2004)Privacy-Preserving Reconciliation Protocols: From Theory to Practice., и . Number Theory and Cryptography, том 8260 из Lecture Notes in Computer Science, стр. 183-210. Springer, (2013)An Efficient Parallel Block-Reduction Algorithm.. ANTS, том 1423 из Lecture Notes in Computer Science, стр. 323-337. Springer, (1998)New Advances on Privacy-Preserving Policy Reconciliation., , и . IACR Cryptology ePrint Archive, (2010)Pathways in Cybersecurity: Translating Theory into Practice.. World Conference on Information Security Education, том 503 из IFIP Advances in Information and Communication Technology, стр. 39-48. Springer, (2017)Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques., , , , , , и . J. Comput. Secur., 25 (1): 59-81 (2017)Advancing the State of Maritime Cybersecurity Guidelines to Improve the Resilience of the Maritime Transportation System., , и . CSR, стр. 503-509. IEEE, (2021)Cryptographic Key Generation from Voice., , , и . S&P, стр. 202-213. IEEE Computer Society, (2001)Cyber Insurance in the Maritime Transportation System., и . LCN, стр. 1-6. IEEE, (2023)Warkitting: The Drive-by Subversion of Wireless Home Routers., , , и . J. Digital Forensic Practice, 1 (3): 179-192 (2006)