From post

Saving Energy on WiFi with Required IPsec.

, , и . SecureComm, том 50 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 144-161. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Nuts and Bolts of a Forum Spam Automator., , и . LEET, USENIX Association, (2011)Delayed password disclosure., и . SIGACT News, 38 (3): 56-75 (2007)Practice & prevention of home-router mid-stream injection attacks., и . eCrime, стр. 1-14. IEEE, (2008)Efficient Amplification of the Security of Weak Pseudo-Random Function Generators.. J. Cryptol., 16 (1): 1-24 (2003)Practical Revocation and Key Rotation., и . CT-RSA, том 10808 из Lecture Notes in Computer Science, стр. 157-178. Springer, (2018)Prevalence and mitigation of forum spamming., , и . INFOCOM, стр. 2309-2317. IEEE, (2011)On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud., , , и . IEEE Symposium on Security and Privacy, стр. 819-838. IEEE Computer Society, (2016)Efficient Amplification of the Security of Weak Pseudo-random Function Generators.. EUROCRYPT, том 2045 из Lecture Notes in Computer Science, стр. 358-372. Springer, (2001)Black-Box Composition Does Not Imply Adaptive Security.. EUROCRYPT, том 3027 из Lecture Notes in Computer Science, стр. 189-206. Springer, (2004)A Case Study on Asprox Infection Dynamics., , и . DIMVA, том 5587 из Lecture Notes in Computer Science, стр. 1-20. Springer, (2009)