From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Verification of Location Claims, , и . Proceedings of the 2Nd ACM Workshop on Wireless Security, стр. 1--10. New York, NY, USA, ACM, (сентября 2003)Security considerations for IEEE 802.15.4 networks., и . Workshop on Wireless Security, стр. 32-42. ACM, (2004)Design and implementation of a sensor network system for vehicle tracking and autonomous interception., , , , , , и . EWSN, стр. 93-107. IEEE, (2005)TinySec: a link layer security architecture for wireless sensor networks., , и . SenSys, стр. 162-175. ACM, (2004)Distillation Codes and Applications to DoS Resistant Multicast Authentication., , , , и . NDSS, The Internet Society, (2004)Designing Voting Machines for Verification.. USENIX Security Symposium, USENIX Association, (2006)Designing voting machines for verification, , и . USENIX Security 2006, (2006)Cryptographic Voting Protocols: A Systems Perspective., , и . USENIX Security Symposium, USENIX Association, (2005)Scrash: A System for Generating Secure Crash Information., , и . USENIX Security Symposium, USENIX Association, (2003)