From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Protecting Location Privacy in Sensor Networks against a Global Eavesdropper., , и . IEEE Trans. Mob. Comput., 11 (2): 320-336 (2012)Persea: a sybil-resistant social DHT., и . CODASPY, стр. 169-172. ACM, (2013)Analysis of an incentives-based secrets protection system., , и . Digital Rights Management Workshop, стр. 22-30. ACM, (2004)Timing Attacks in Low-Latency Mix Systems (Extended Abstract)., , , и . Financial Cryptography, том 3110 из Lecture Notes in Computer Science, стр. 251-265. Springer, (2004)Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis., , и . INFOCOM, стр. 1773-1781. IEEE, (2009)Leveraging Real-Life Facts to Make Random Passwords More Memorable., , , и . ESORICS (2), том 9327 из Lecture Notes in Computer Science, стр. 438-455. Springer, (2015)EnPassant: anonymous routing for disruption-tolerant networks with applications in assistive environments., , , и . Secur. Commun. Networks, 4 (11): 1243-1256 (2011)Poster: shaping network topology for privacy and performance., и . ACM Conference on Computer and Communications Security, стр. 813-816. ACM, (2011)Pisces: Anonymous Communication Using Social Networks, , и . CoRR, (2012)The Dynamics of Salsa: A Robust Structured P2P System., , , и . Netw. Protoc. Algorithms, 2 (4): 40-60 (2010)