From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Architecture and Implementation of Network Layer Security in UNIX., и . USENIX Security Symposium, USENIX Association, (1993)Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities., , , и . ACSAC, стр. 251-260. ACM, (2010)The MacGuffin Block Cipher Algorithm., и . FSE, том 1008 из Lecture Notes in Computer Science, стр. 97-110. Springer, (1994)Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion).. Security Protocols Workshop, том 2133 из Lecture Notes in Computer Science, стр. 54-61. Springer, (2000)The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion).. Security Protocols Workshop, том 7622 из Lecture Notes in Computer Science, стр. 64-75. Springer, (2012)Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols., , , , , , и . Security Protocols Workshop, том 2467 из Lecture Notes in Computer Science, стр. 27-39. Springer, (2001)Experience with the KeyNote Trust Management System: Applications and Future Directions., , и . iTrust, том 2692 из Lecture Notes in Computer Science, стр. 284-300. Springer, (2003)On the Reliability of Network Eavesdropping Tools., , и . IFIP Int. Conf. Digital Forensics, том 222 из IFIP Advances in Information and Communication Technology, стр. 199-213. Springer, (2006)Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System., , , , , и . USENIX Security Symposium, USENIX Association, (2011)Transparent Mistrust: OS Support for Cryptography-in-the-Large.. Workshop on Workstation Operating Systems, стр. 98-102. IEEE Computer Society, (1993)