From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Algebraic Approach to Modeling in Software Engineering., и . AMAST, стр. 385-392. Springer, (1993)Efficient key establishment for group-based wireless sensor deployments., , и . Workshop on Wireless Security, стр. 1-10. ACM, (2005)Designing an Agent Synthesis System for Cross-RPC Communication., и . IEEE Trans. Software Eng., 20 (3): 188-198 (1994)Dynamic Merkle Trees for Verifying Privileges in Sensor Networks., и . ICC, стр. 2276-2282. IEEE, (2006)Combining ORAM with PIR to Minimize Bandwidth Costs., и . CODASPY, стр. 289-296. ACM, (2015)Hierarchical policy delegation in multiple-authority ABE., и . Int. J. Inf. Comput. Secur., 7 (2/3/4): 140-159 (2015)Spatial Hash-Joins., и . SIGMOD Conference, стр. 247-258. ACM Press, (1996)Distributed Center-Location Algorithms: Proposals and Comparisons., и . INFOCOM, стр. 75-84. IEEE Computer Society, (1996)Foisting and Stealing of Keys in Sensor Networks., и . EWSN, том 7158 из Lecture Notes in Computer Science, стр. 49-64. Springer, (2012)DHCP Origin Traceback., , и . ICDCN, том 6522 из Lecture Notes in Computer Science, стр. 394-406. Springer, (2011)