From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Protecting the Itinerary of Mobile Agents., , и . ECOOP Workshops, том 1543 из Lecture Notes in Computer Science, стр. 301. Springer, (1998)A Pessimistic Approach to Trust in Mobile Agent Platforms., , и . IEEE Internet Comput., 4 (5): 40-48 (2000)Cryptographic Protection of Connection Integrity with Interruption Detection in TINA., и . DAIS, Chapman & Hall, (1997)An Identity-Based Key-Encapsulation Mechanism Built on Identity-Based Factors Selection.. AFRICACRYPT, том 7918 из Lecture Notes in Computer Science, стр. 392-405. Springer, (2013)Extensions to an authentication technique proposed for the global mobility network., , , и . IEEE Trans. Commun., 48 (3): 373-376 (2000)Workshop on Electronic Commerce - Foreword., и . SRDS, стр. 329. IEEE Computer Society, (1999)Introducing Trusted Third Parties to the Mobile Agent Paradigm., , и . Secure Internet Programming, том 1603 из Lecture Notes in Computer Science, стр. 469-489. Springer, (1999)Closed user groups in Internet service centres., , , , , и . DAIS, том 143 из IFIP Conference Proceedings, стр. 439-. Kluwer, (1999)On the Problem of Trust in Mobile Agent Systems., , и . NDSS, The Internet Society, (1998)A Simple Logic for Authentication Protocol Design., , и . CSFW, стр. 153-162. IEEE Computer Society, (1998)