From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

RoboAdmin: A Different Approach to Remote System Administration., и . WOSIS, стр. 43-52. INSTICC Press, (2007)Splitting the HTTPS Stream to Attack Secure Web Connections., , , и . IEEE Secur. Priv., 8 (6): 80-84 (2010)Password similarity using probabilistic data structures., , , и . CoRR, (2020)Cloud-of-Things meets Mobility-as-a-Service: An insider threat perspective., , , и . Comput. Secur., (2018)P-IOTA: A Cloud-Based Geographically Distributed Threat Alert System That Leverages P4 and IOTA., , , , , и . Sensors, 23 (6): 2955 (марта 2023)An Integrated Application of Security Testing Methodologies to e-voting Systems., и . ePart, том 6229 из Lecture Notes in Computer Science, стр. 225-236. Springer, (2010)Privacy-Preserving Design of Data Processing Systems in the Public Transport Context., , , , и . Pac. Asia J. Assoc. Inf. Syst., 7 (4): 4 (2015)Comment Spam Injection Made Easy., и . CCNC, стр. 1-5. IEEE, (2009)An Application of Efficient Certificate Status Handling Methods to High Traffic Authentication Services., и . ISCC, стр. 821-827. IEEE Computer Society, (2003)Taking the Best of Both Worlds: A Comparison and Integration of the U.S. and EU Approaches to E-Voting Systems Evaluation., и . HICSS, стр. 1-10. IEEE Computer Society, (2011)