From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Buffer Overrun Prevention Through Component Composition Analysis., , , и . COMPSAC (1), стр. 156-163. IEEE Computer Society, (2005)Analysis of Digital Image Watermark Attacks., , , и . CCNC, стр. 1-5. IEEE, (2010)On Securing MANET Routing Protocol Against Control Packet Dropping., , , , и . ICPS, стр. 100-108. IEEE Computer Society, (2007)A security framework for executables in a ubiquitous computing environment., , , и . GLOBECOM, стр. 2158-2163. IEEE, (2004)Efficient autonomous signature exchange on ubiquitous networks., , и . J. Netw. Comput. Appl., 35 (6): 1793-1806 (2012)A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing., , и . CIT/IUCC/DASC/PICom, стр. 618-625. IEEE, (2015)Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation., , , и . SecureComm, стр. 243-248. IEEE, (2005)Extending AOP Principles for the Description of Network Security Patterns., , и . Cyberpatterns, Springer, (2014)Monitoring connectivity in wireless sensor networks., , , и . ISCC, стр. 507-512. IEEE Computer Society, (2009)An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment., , , и . ITCC (1), стр. 112-117. IEEE Computer Society, (2004)