From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Pattern Language for Cryptographic Key Management., и . EuroPLoP, стр. 245-258. UVK - Universitaetsverlag Konstanz, (2002)Towards self-organising personal networks., , , , , , , , и . DIN@MobiCom, стр. 12-16. ACM, (2005)Opportunities in Using a Secure Element to Increase Confidence in Cloud Security Monitoring., , и . CLOUD, стр. 1093-1098. IEEE Computer Society, (2015)Mobile Active Overlay., , , и . IWAN, том 1942 из Lecture Notes in Computer Science, стр. 416-422. Springer, (2000)Architecture for High Confidence Cloud Security Monitoring., , , , и . IC2E, стр. 195-200. IEEE Computer Society, (2015)Service and Resource Discovery Using P2P., , и . DEXA Workshops, стр. 732-736. IEEE Computer Society, (2006)Light Quantum Key Distribution Network Security Estimation Tool., , , и . SECRYPT, стр. 587-596. SCITEPRESS, (2023)