From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient and secure threshold-based event validation for VANETs., , , , и . WISEC, стр. 163-174. ACM, (2011)Mobile user location-specific encryption (MULE): using your office as your password., и . WISEC, стр. 151-162. ACM, (2010)Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes., , , и . SenSys, стр. 233-246. ACM, (2007)ACComplice: Location inference using accelerometers on smartphones., , , , и . COMSNETS, стр. 1-9. IEEE, (2012)Network Transparency for Better Internet Security., , , , и . IEEE/ACM Trans. Netw., 27 (5): 2028-2042 (2019)(R)Evolutionary Bootstrapping of a Global PKI for Securing BGP., , , , и . HotNets, ACM SIGCOMM, (2006)The Coremelt Attack., и . ESORICS, том 5789 из Lecture Notes in Computer Science, стр. 37-52. Springer, (2009)AGVI - Automatic Generation, Verification, and Implementation of Security Protocols., , и . CAV, том 2102 из Lecture Notes in Computer Science, стр. 241-245. Springer, (2001)Ariadne: a secure on-demand routing protocol for ad hoc networks., , и . MobiCom, стр. 12-23. ACM, (2002)Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure., , , , и . WWW, стр. 679-690. International World Wide Web Conferences Steering Committee / ACM, (2013)