From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Toward the PSTN/Internet Inter-Networking-Pre-PINT Implementations., , , , , , , , , и . RFC, (ноября 1998)Guidelines for Specifying the Use of IPsec Version 2.. RFC, (февраля 2009)The Security Flag in the IPv4 Header.. RFC, (апреля 2003)The Insider Attack Problem Nature and Scope.. Insider Attack and Cyber Security, том 39 из Advances in Information Security, Springer, (2008)IP Traceback.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)An IBE-based Signcryption Scheme for Group Key Management., , , , и . CoRR, (2016)Privacy-Enhanced Searches Using Encrypted Bloom Filters., и . IACR Cryptology ePrint Archive, (2004)The Government and Cybersecurity.. IEEE Secur. Priv., 7 (2): 96 (2009)What Should Crypto Look Like?. IEEE Secur. Priv., 12 (6): 108 (2014)Clouds from Both Sides.. IEEE Secur. Priv., 9 (3): 88 (2011)