From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Denial of Service Issues in Voice Over IP Networks., , , , и . ICETE (2), стр. 230-237. INSTICC Press, (2004)Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols., , и . Public Key Cryptography, том 5443 из Lecture Notes in Computer Science, стр. 105-123. Springer, (2009)A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA., , , , и . S-CUBE, том 24 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 66-82. Springer, (2009)Round-optimal Contributory Conference Key Agreement, и . Public Key Cryptography -- PKC 2003, том 2567 из Lecture Notes in Computer Science, стр. 161--174. Springer, (2003)How HCI design influences web security decisions., , , и . OZCHI, стр. 252-255. ACM, (2010)"Who decides?": security and privacy in the wild., , , и . OZCHI, стр. 27-36. ACM, (2013)Strongly Secure Certificateless Key Agreement., , и . Pairing, том 5671 из Lecture Notes in Computer Science, стр. 206-230. Springer, (2009)A Password-Based Authenticator: Security Proof and Applications., , , , и . INDOCRYPT, том 2904 из Lecture Notes in Computer Science, стр. 388-401. Springer, (2003)Tripartite Key Exchange in the Canetti-Krawczyk Proof Model., , и . INDOCRYPT, том 3348 из Lecture Notes in Computer Science, стр. 17-32. Springer, (2004)Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking., , и . ACISP, том 7372 из Lecture Notes in Computer Science, стр. 434-441. Springer, (2012)