From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security of electrostatic field persistent routing: Attacks and defense mechanisms., , , и . Ad Hoc Networks, (2016)Secure multicast routing in wireless networks., и . ACM SIGMOBILE Mob. Comput. Commun. Rev., 11 (2): 55-56 (2007)A survey of attack and defense techniques for reputation systems., , и . ACM Comput. Surv., 42 (1): 1:1-1:31 (2009)Entropy attacks and countermeasures in wireless network coding., , и . WISEC, стр. 185-196. ACM, (2012)Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption., и . CT-RSA, том 2271 из Lecture Notes in Computer Science, стр. 182-199. Springer, (2002)Automated Attacker Synthesis for Distributed Protocols., , , и . SAFECOMP, том 12234 из Lecture Notes in Computer Science, стр. 133-149. Springer, (2020)ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection., , , , , , и . Proc. VLDB Endow., 8 (12): 1828-1839 (2015)Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks., , , , , , , и . IEEE Trans. Dependable Secur. Comput., 7 (1): 80-93 (2010)Secure Group Communication Using Robust Contributory Key Agreement., , , , , и . IEEE Trans. Parallel Distributed Syst., 15 (5): 468-480 (2004)SABRE: Robust Bayesian Peer-to-Peer Federated Learning., , , , и . CoRR, (2023)