From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Why HTTPS Is Not Enough – Signature-Based Architecture for Trusted Content on the WWW, , и . n Proc. of the 2007 IEEE / WIC /ACM Int. Conf. on Web Intelligence (WI 2007), (2007)location=Silicon Valley, date=2007.Tele-Lab IT-Security - IT Sicherheitstraining im Internet, , и . D-A-C-H Security 2005, syssec Verlag, (2005)Tele-Lecturing - Quo vadis Vorlesungsaufzeichnungen.. DeLFI Workshops, стр. 141. Logos Verlag, (2009)BMXNet 2: An Open Source Framework for Low-bit Networks - Reproducing, Understanding, Designing and Showcasing., , , и . ACM Multimedia, стр. 4469-4472. ACM, (2020)All about that BASE: Modeling Biometric Authentication Systems and their Evaluations to enable a more efficient Exchange of Research Results., и . IJCB, стр. 1-10. IEEE, (2023)Exploring possibilities to partially transform simulation exercises into interactive games on OpenWHO.org digitizing live role-playing game exercises online for epidemics and health emergency work., , , и . SeGAH, стр. 1-6. IEEE, (2018)The Right Tool for the Job: Contextualization of Cybersecurity Education and Assessment Methods., и . ICISSP, стр. 234-241. SCITEPRESS, (2024)Virtual Machine Integration & Fault Recovery in Crowd-Resourcing Virtual Laboratory., , и . ICCCM, стр. 224-230. ACM, (2019)Separating Complexity Classes Related to Restricted Logarithmic Space-Bounded Turing Machines., , и . IFIP Congress, стр. 287-292. North-Holland/IFIP, (1989)Interrogating e-Justice: Lessons from Digitalizing Courts in Chile., , и . EGOV-CeDEM-ePart-*, том 3399 из CEUR Workshop Proceedings, CEUR-WS.org, (2022)