From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

User Controlled Sharing in a Variable Connected Distributed System., и . WETICE, стр. 250-255. IEEE Computer Society, (1998)Security and Middleware., , , и . WORDS, стр. 186-190. IEEE Computer Society, (2003)Reflective Middleware and Security: OOPP meets Obol., , , , и . Middleware Workshops, стр. 100-104. PUC-Rio, (2003)Conflict Resolution for User-Selected Names in Collaborative Systems., , и . CSCWD, стр. 109-114. IEEE, (2007)The Open-End Argument for Private Computing., , и . HUC, том 1707 из Lecture Notes in Computer Science, стр. 124-136. Springer, (1999)Names in Cryptographic Protocols., , и . WOSIS, стр. 185-194. INSTICC Press, (2006)Public-Key Cryptography and Availability., и . SAFECOMP, том 3688 из Lecture Notes in Computer Science, стр. 222-232. Springer, (2005)A Decentralized Authorization Architecture., , и . AINA Workshops (1), стр. 497-504. IEEE Computer Society, (2007)Gaining Flexibility by Security Protocol Transfer., и . ISCC, стр. 859-864. IEEE Computer Society, (2007)Smartcards: Hot to Put them to Use in a User-Centric System.. HUC, том 1927 из Lecture Notes in Computer Science, стр. 200-210. Springer, (2000)