From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CED2: Communication Efficient Disjointness Decision., , и . SecureComm, том 50 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 290-306. Springer, (2010)Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN., , , и . SecureComm, том 19 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 265-284. Springer, (2009)Time Warp: How Time Affects Privacy in LBSs., , , и . ICICS, том 6476 из Lecture Notes in Computer Science, стр. 325-339. Springer, (2010)Covert Channel-Based Transmitter Authentication in Controller Area Networks., , , , и . CoRR, (2019)The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks., , , , и . WWIC, том 5546 из Lecture Notes in Computer Science, стр. 85-96. Springer, (2009)Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion).. Security Protocols Workshop, том 7622 из Lecture Notes in Computer Science, стр. 214-222. Springer, (2012)Reliable Group Communication Protocol for Internet of Things., , и . CoRR, (2019)Windows Mobile LiveSD Forensics., , , и . J. Netw. Comput. Appl., 36 (2): 677-684 (2013)The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis., , , и . CoRR, (2017)FOCAN: A Fog-supported smart city network architecture for management of applications in the Internet of Everything environments., , , , и . J. Parallel Distributed Comput., (2019)