From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A game theoretic trust model for on-line distributed evolution of cooperation inMANETs., , , , и . J. Netw. Comput. Appl., 34 (1): 39-51 (2011)Secure brokerage mechanisms for mobile electronic commerce., , , и . Comput. Commun., 29 (12): 2308-2321 (2006)Optimal tag suppression for privacy protection in the semantic Web., , , , и . Data Knowl. Eng., (2012)A model for revocation forecasting in public-key infrastructures., , , , и . Knowl. Inf. Syst., 43 (2): 311-331 (2015)Punishing Malicious Hosts with the Cryptographic Traces Approach., , , и . New Gener. Comput., 24 (4): 351-376 (2006)Contribución a la protección de agentes móviles frente a hosts maliciosos. Detección de ataques y políticas de castigo.. Polytechnic University of Catalonia, Spain, (2004)Cross-layer architecture for TCP splitting in the return channel over satellite networks., , , , и . ISWCS, стр. 225-229. IEEE, (2009)PKIX Certificate Status in Hybrid MANETs., , , и . WISTP, том 5746 из Lecture Notes in Computer Science, стр. 153-166. Springer, (2009)Efficient Offline Certificate Revocation., , , и . MIPS, том 2899 из Lecture Notes in Computer Science, стр. 319-330. Springer, (2003)Protocols for Malicious Host Revocation., , , и . ICICS, том 2836 из Lecture Notes in Computer Science, стр. 191-201. Springer, (2003)