From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Whole exome sequencing analysis pipeline for the discovery of mutations causative of human rare diseases., , , , , , , , , и 1 other автор(ы). IWBBIO, стр. 253-254. Copicentro Editorial, (2013)Modeling and Simulation of Upper Brachial Plexus Injury., , , , , и . IEEE Syst. J., 10 (3): 912-921 (2016)A First Approach to Provide Anonymity in Attribute Certificates., , , и . Public Key Cryptography, том 2947 из Lecture Notes in Computer Science, стр. 402-415. Springer, (2004)Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication., , , и . CANS, том 4856 из Lecture Notes in Computer Science, стр. 265-281. Springer, (2007)Modeling Malware-driven Honeypots., , и . TrustBus, том 10442 из Lecture Notes in Computer Science, стр. 130-144. Springer, (2017)Distributed Storage and Revocation in Digital Certificate Databases., , , и . DEXA, том 1873 из Lecture Notes in Computer Science, стр. 929-938. Springer, (2000)A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI., , , и . ISC, том 2433 из Lecture Notes in Computer Science, стр. 136-149. Springer, (2002)How to Specify Security Services: A Practical Approach., , , и . Communications and Multimedia Security, том 2828 из Lecture Notes in Computer Science, стр. 158-171. Springer, (2003)Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems., , и . CRITIS, том 10242 из Lecture Notes in Computer Science, стр. 176-188. Springer, (2016)Addressing Security in OCPP: Protection Against Man-in-the-Middle Attacks., , и . NTMS, стр. 1-5. IEEE, (2018)