From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Punishing Malicious Hosts with the Cryptographic Traces Approach., , , и . New Gener. Comput., 24 (4): 351-376 (2006)A model for revocation forecasting in public-key infrastructures., , , , и . Knowl. Inf. Syst., 43 (2): 311-331 (2015)Secure brokerage mechanisms for mobile electronic commerce., , , и . Comput. Commun., 29 (12): 2308-2321 (2006)A game theoretic trust model for on-line distributed evolution of cooperation inMANETs., , , , и . J. Netw. Comput. Appl., 34 (1): 39-51 (2011)Optimal tag suppression for privacy protection in the semantic Web., , , , и . Data Knowl. Eng., (2012)Efficient Offline Certificate Revocation., , , и . MIPS, том 2899 из Lecture Notes in Computer Science, стр. 319-330. Springer, (2003)PKIX Certificate Status in Hybrid MANETs., , , и . WISTP, том 5746 из Lecture Notes in Computer Science, стр. 153-166. Springer, (2009)Cross-layer architecture for TCP splitting in the return channel over satellite networks., , , , и . ISWCS, стр. 225-229. IEEE, (2009)Contribución a la protección de agentes móviles frente a hosts maliciosos. Detección de ataques y políticas de castigo.. Polytechnic University of Catalonia, Spain, (2004)Impact of the Revocation Service in PKI Prices., , , , и . ICICS, том 7618 из Lecture Notes in Computer Science, стр. 22-32. Springer, (2012)