From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A New Class of Codes for Fingerprinting Schemes., , и . ISPEC, том 3439 из Lecture Notes in Computer Science, стр. 398-409. Springer, (2005)A generalization of traceability codes using ideal-based codes., и . ITW, стр. 66-69. IEEE, (2003)Multicast Copyright Protection System Based on a Trusted Soft-Engine., , , и . Int. J. Bus. Data Commun. Netw., 2 (2): 55-67 (2006)Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts., , , , и . DEXA, том 2736 из Lecture Notes in Computer Science, стр. 927-936. Springer, (2003)Optimizing energy-efficiency of PHY-Layer authentication in machine-to-machine networks., , , , , и . GLOBECOM Workshops, стр. 1663-1668. IEEE, (2012)Implementation of an Efficient Authenticated Dictionary for Certificate Revocation., , , и . ISCC, стр. 238-243. IEEE Computer Society, (2003)A protocol for detecting malicious hosts based on limiting the execution time of mobile agents., , , и . ISCC, стр. 251-256. IEEE Computer Society, (2003)Practical Asymmetric Fingerprinting with a TTP., , , и . DEXA Workshops, стр. 352-356. IEEE Computer Society, (2003)DocCloud: A document recommender system on cloud computing with plausible deniability., , , и . Inf. Sci., (2014)Development of a platform offering video copyright protection and security against illegal distribution., , , , и . Security, Steganography, and Watermarking of Multimedia Contents, том 5681 из Proceedings of SPIE, стр. 76-83. SPIE, (2005)