From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Empirical Research and Research Ethics in Information Security., , и . ICISSP (Revised Selected Papers), том 691 из Communications in Computer and Information Science, стр. 14-22. Springer, (2016)Cybersecurity - Introduction to the Special Theme., и . ERCIM News, (2016)Forensics using Internal Database Structures., , и . ERCIM News, (2017)Identifying and Incorporating Affective States and Learning Styles in Web-based Learning Management Systems., , , и . IxD&A, (2010)Securing the Internet, One HTTP 200 OK at a Time., , , и . login Usenix Mag., (2017)Security aspects of ubiquitous computing in healthcare., , и . Elektrotech. Informationstechnik, 123 (4): 156-161 (2006)Guest Editorial: Advances in Applied Security., , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2 (4): 1-3 (2011)Echoes of the Past: Recovering Blockchain Metrics from Merged Mining., , , , , и . Financial Cryptography, том 11598 из Lecture Notes in Computer Science, стр. 527-549. Springer, (2019)Exploiting Ontology for Software License Agreements., , , и . Int. J. Softw. Informatics, 4 (1): 89-100 (2010)RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness., , , , и . IACR Cryptol. ePrint Arch., (2020)