From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Communication for RFIDs Proactive Information Security Within Computational Security., и . SSS, том 4280 из Lecture Notes in Computer Science, стр. 290-303. Springer, (2006)Information security for sensors by overwhelming random sequences and permutations., , , , и . ACM Conference on Computer and Communications Security, стр. 669-671. ACM, (2010)Poster: attribute based broadcast encryption with permanent revocation., , и . ACM Conference on Computer and Communications Security, стр. 757-760. ACM, (2011)Exploiting simultaneous usage of different wireless interfaces for security and mobility., , , , , , и . FGCT, стр. 21-26. IEEE, (2013)Computing multi-party trust privately: in O(n) time units sending one (possibly large) message at a time., , и . SAC, стр. 1460-1465. ACM, (2010)Innovative approaches for security of small artefacts., , , , , , и . Comput. Sci. Rev., 5 (1): 47-55 (2011)Anonymous Transactions in Computer Networks., и . SSS, том 5873 из Lecture Notes in Computer Science, стр. 297-310. Springer, (2009)Permanent Revocation in Attribute Based Broadcast Encryption., , и . CyberSecurity, стр. 203-208. IEEE Computer Society, (2012)Entropy Adaptive On-Line Compression., , и . NCA, стр. 162-166. IEEE Computer Society, (2014)