From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities., , , и . ACSAC, стр. 251-260. ACM, (2010)IP Security Policy (IPSP) Requirements., , , и . RFC, (августа 2003)The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion).. Security Protocols Workshop, том 7622 из Lecture Notes in Computer Science, стр. 64-75. Springer, (2012)Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols., , , , , , и . Security Protocols Workshop, том 2467 из Lecture Notes in Computer Science, стр. 27-39. Springer, (2001)Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion).. Security Protocols Workshop, том 2133 из Lecture Notes in Computer Science, стр. 54-61. Springer, (2000)On the Reliability of Network Eavesdropping Tools., , и . IFIP Int. Conf. Digital Forensics, том 222 из IFIP Advances in Information and Communication Technology, стр. 199-213. Springer, (2006)Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System., , , , , и . USENIX Security Symposium, USENIX Association, (2011)Transparent Mistrust: OS Support for Cryptography-in-the-Large.. Workshop on Workstation Operating Systems, стр. 98-102. IEEE Computer Society, (1993)Going Bright: Wiretapping without Weakening Communications Infrastructure., , , и . IEEE Secur. Priv., 11 (1): 62-72 (2013)The Architecture and Implementation of Network Layer Security in UNIX., и . USENIX Security Symposium, USENIX Association, (1993)