From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

wIDS: A Multilayer IDS for Wireless-Based SCADA Systems., , , и . ICISS, том 10717 из Lecture Notes in Computer Science, стр. 387-404. Springer, (2017)Decomposition of Multilevel Objects in an Object-Oriented Database., , , и . ESORICS, том 875 из Lecture Notes in Computer Science, стр. 375-402. Springer, (1994)Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking., , , , и . DPM/SETOP, том 5939 из Lecture Notes in Computer Science, стр. 153-162. Springer, (2009)An Extended Role-Based Access Control Model for Delegating Obligations., , , и . TrustBus, том 5695 из Lecture Notes in Computer Science, стр. 127-137. Springer, (2009)Formal Development of Authentication Protocols., и . Refine, стр. 80-102. Springer, (1994)Car2X Communication - Putting Security Negotiation into Practice., , , и . VTC Fall, стр. 1-5. IEEE, (2014)A secured delegation of remote services on IPv6 home networks., , , , и . CRiSIS, стр. 12-18. IEEE, (2009)Consistency Policies for Dynamic Information Systems with Declassification Flows., , и . ICISS, том 7093 из Lecture Notes in Computer Science, стр. 87-101. Springer, (2011)PrivComp: a privacy-aware data service composition system., , , , и . EDBT, стр. 757-760. ACM, (2013)Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption., , , , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 4 (2): 39-62 (2013)