From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How secure is WiFi MAC layer in comparison with IPsec for classified environments?, , , , , и . SpringSim (CNS), стр. 109-116. SCS/ACM, (2011)Security Constraint Allocation in Distributed Object Databases.. IC-AI, стр. 981-984. CSREA Press, (2003)Optimal Placement of Distributed Iterrelated Data Components using Genetic Algorithms. Late Breaking Papers at the Genetic Programming 1998 Conference, стр. 52--58. University of Wisconsin, Madison, Wisconsin, USA, Stanford University Bookstore, (22-25 July 1998)Optimal placement of distributed interrelated data components using genetic algorithms., и . ACM Southeast Regional Conference, ACM, (1999)Theoretical properties of two problems of distribution of interrelated data.. ACM Southeast Regional Conference, стр. 395-398. ACM, (2006)Software Security: The Dangerous Afterthought., , , , , , и . ITNG, стр. 815-818. IEEE Computer Society, (2012)