From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Precision in elections - Extracting a precise result from an inherently imprecise process.. Int. J. Crit. Infrastructure Prot., 5 (3-4): 135-136 (2012)Centers of Academic Excellence: A Case Study., и . IEEE Secur. Priv., 3 (1): 62-65 (2005)Analyzing Internet Security Protocols., и . HASE, стр. 149-162. IEEE Computer Society, (2001)Of unicorns and random programs., и . Communications and Computer Networks, стр. 24-30. IASTED/ACTA Press, (2005)Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer., , и . Security Protocols Workshop, том 4631 из Lecture Notes in Computer Science, стр. 228-237. Springer, (2005)Help! Is There a Trustworthy-Systems Doctor in the House?, и . IEEE Secur. Priv., 11 (1): 73-77 (2013)Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract)., и . Security Protocols Workshop, том 2845 из Lecture Notes in Computer Science, стр. 189-202. Springer, (2002)An Environment for Security Protocol Intrusion Detection.. J. Comput. Secur., 10 (1/2): 177-188 (2002)Application Security Models for Mobile Agent Systems., и . STM, том 157 из Electronic Notes in Theoretical Computer Science, стр. 43-59. Elsevier, (2005)Knowledge Sharing and Reuse in Digital Forensics., , и . SADFE, стр. 73-78. IEEE Computer Society, (2010)