From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures., , , , и . HOTPOST@MobiHoc, стр. 31-36. ACM, (2016)Towards traffic-oriented spreading factor allocations in LoRaWAN systems., , , , , , , , и . Med-Hoc-Net, стр. 1-8. IEEE, (2018)Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication., , , , , , , , , и 1 other автор(ы). CoRR, (2018)D-STREAMON - NFV-Capable Distributed Framework for Network Monitoring., , , , , , и . SOFT5@ITC, стр. 30-35. IEEE, (2017)978-0-9883045-3-6.EXPLoRa: Extending the performance of LoRa by suitable spreading factor allocations., , , , , и . WiMob, стр. 1-8. IEEE Computer Society, (2017)On the feasibility of attribute-based encryption for WLAN access control., , , , и . WiMob, стр. 1-8. IEEE Computer Society, (2017)D-StreaMon: From middlebox to distributed NFV framework for network monitoring., , , , , , и . LANMAN, стр. 1-2. IEEE, (2017)FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication., , , , и . ARES, стр. 715-724. IEEE Computer Society, (2016)A Web Platform for Integrated Vulnerability Assessment and Cyber Risk Management., , , и . Information, 10 (7): 242 (2019)Conditional disclosure of encrypted whitelists for DDoS attack mitigation., , , и . GLOBECOM Workshops, стр. 200-206. IEEE, (2013)