From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient and secure threshold-based event validation for VANETs., , , , и . WISEC, стр. 163-174. ACM, (2011)Mobile user location-specific encryption (MULE): using your office as your password., и . WISEC, стр. 151-162. ACM, (2010)Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes., , , и . SenSys, стр. 233-246. ACM, (2007)AGVI - Automatic Generation, Verification, and Implementation of Security Protocols., , и . CAV, том 2102 из Lecture Notes in Computer Science, стр. 241-245. Springer, (2001)Ariadne: a secure on-demand routing protocol for ad hoc networks., , и . MobiCom, стр. 12-23. ACM, (2002)The Coremelt Attack., и . ESORICS, том 5789 из Lecture Notes in Computer Science, стр. 37-52. Springer, (2009)Website Fingerprinting in the Age of QUIC., , и . Proc. Priv. Enhancing Technol., 2021 (2): 48-69 (2021)DFL: Secure and Practical Fault Localization for Datacenter Networks., , , , , , и . IEEE/ACM Trans. Netw., 22 (4): 1218-1231 (2014)Security and Privacy in Sensor Networks., и . Computer, 36 (10): 103-105 (2003)PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer., и . Proc. Priv. Enhancing Technol., 2017 (1): 100-117 (2017)