From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Security Architecture for Computational Grids, , , и . Proceedings of 5th ACM Conference Computer and Communications Security, стр. 83--92. (1998)Efficient Aggregation of encrypted data in Wireless Sensor Networks, , и . Mobile and Ubiquitous Systems: Networking and Services, (2005)(If) Size Matters: Size-Hiding Private Set Intersection., , и . Public Key Cryptography, том 6571 из Lecture Notes in Computer Science, стр. 156-173. Springer, (2011)Harvesting SSL Certificate Data to Identify Web-Fraud., , , и . Int. J. Netw. Secur., 14 (6): 324-338 (2012)Balancing Security and Privacy in Genomic Range Queries., , и . ACM Trans. Priv. Secur., 26 (3): 23:1-23:28 (августа 2023)Authentication of mobile users., , и . IEEE Netw., 8 (2): 26-34 (1994)New adversary and new threats: security in unattended sensor networks., , и . IEEE Netw., 23 (2): 43-48 (2009)Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric., , и . CoRR, (2017)Group Signatures Á la carte., и . SODA, стр. 848-849. ACM/SIAM, (1999)ANDaNA: Anonymous Named Data Networking Application, , , и . CoRR, (2011)