From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CRIM: un module de corrélation d'alertes et de réaction aux attaques., и . Ann. des Télécommunications, 61 (9-10): 1172-1192 (2006)XeNA: an access negotiation framework using XACML., , , и . Ann. des Télécommunications, 64 (1-2): 155-169 (2009)Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption., , , , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 4 (2): 39-62 (2013)An ontology-based approach to react to network attacks., , , и . Int. J. Inf. Comput. Secur., 3 (3/4): 280-305 (2009)Car2X Communication - Putting Security Negotiation into Practice., , , и . VTC Fall, стр. 1-5. IEEE, (2014)A secured delegation of remote services on IPv6 home networks., , , , и . CRiSIS, стр. 12-18. IEEE, (2009)Consistency Policies for Dynamic Information Systems with Declassification Flows., , и . ICISS, том 7093 из Lecture Notes in Computer Science, стр. 87-101. Springer, (2011)PrivComp: a privacy-aware data service composition system., , , , и . EDBT, стр. 757-760. ACM, (2013)Detecting and Reacting against Distributed Denial of Service Attacks., , и . ICC, стр. 2394-2400. IEEE, (2006)Extending answers to neighbour entities in a cooperative answering context., и . Decis. Support Syst., 7 (1): 1-11 (1991)