From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Buffer Overrun Prevention Through Component Composition Analysis., , , и . COMPSAC (1), стр. 156-163. IEEE Computer Society, (2005)Analysis of Digital Image Watermark Attacks., , , и . CCNC, стр. 1-5. IEEE, (2010)On Securing MANET Routing Protocol Against Control Packet Dropping., , , , и . ICPS, стр. 100-108. IEEE Computer Society, (2007)A security framework for executables in a ubiquitous computing environment., , , и . GLOBECOM, стр. 2158-2163. IEEE, (2004)Efficient autonomous signature exchange on ubiquitous networks., , и . J. Netw. Comput. Appl., 35 (6): 1793-1806 (2012)Intentionality and Agency in Security., , , , и . Security Protocols Workshop, том 11286 из Lecture Notes in Computer Science, стр. 114-125. Springer, (2018)Data Encryption Using Bio Molecular Information. International Journal on Cryptography and Information Security (IJCIS), 4 (3): 21-33 (сентября 2014)Visualdrives Forensic Tool., , , и . DeSE, стр. 107-111. IEEE, (2015)Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation., , , и . SecureComm, стр. 243-248. IEEE, (2005)An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment., , , и . ITCC (1), стр. 112-117. IEEE Computer Society, (2004)