From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Cartoons to Teach Internet Security., и . Cryptologia, 32 (2): 137-154 (2008)Web Forms and Untraceable DDoS Attacks, и . Network Security, XXIII, Springer, (2010)Phishing., , и . Handbook of Financial Cryptography and Security, Chapman and Hall/CRC, (2010)Case Study: Sales Scams., , , и . Understanding Social Engineering Based Scams, Springer, (2016)Warkitting: The Drive-by Subversion of Wireless Home Routers., , , и . J. Digital Forensic Practice, 1 (3): 179-192 (2006)Proprietary Certificates., , и . CT-RSA, том 2271 из Lecture Notes in Computer Science, стр. 164-181. Springer, (2002)Implicit Authentication through Learning User Behavior., , , и . ISC, том 6531 из Lecture Notes in Computer Science, стр. 99-113. Springer, (2010)Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function., , и . EUROCRYPT, том 1233 из Lecture Notes in Computer Science, стр. 280-305. Springer, (1997)Mix and Match: Secure Function Evaluation via Ciphertexts., и . ASIACRYPT, том 1976 из Lecture Notes in Computer Science, стр. 162-177. Springer, (2000)Efficient attribute authentication with applications to ad hoc networks., и . Vehicular Ad Hoc Networks, стр. 38-46. ACM, (2004)