From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Programmable Presence Virtualization for Next-Generation Context-Based Applications., , , , , , , и . PerCom, стр. 1-10. IEEE Computer Society, (2009)The impact of TLS on SIP server performance., , , и . IPTComm, стр. 59-70. ACM, (2010)Real-time monitoring of SIP infrastructure using message classification., , , , и . MineNet, стр. 45-50. ACM, (2007)Presence virtualization middleware for next-generation converged applications., , , , , , , и . Middleware (Companion), стр. 124-126. ACM, (2008)A programmable message classification engine for session initiation protocol (SIP)., , и . ANCS, стр. 185-194. ACM, (2007)Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption., , , , , , , и . NDSS, The Internet Society, (2019)Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces., , , , и . NDSS, The Internet Society, (2007)On incremental file system development., , , , и . ACM Trans. Storage, 2 (2): 161-196 (2006)The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption., и . ACM Conference on Computer and Communications Security, стр. 1341-1352. ACM, (2016)The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage., , и . DSN, стр. 517-529. IEEE, (2019)