From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

GPS-free Positioning in Mobile Ad Hoc Networks., , и . Clust. Comput., 5 (2): 157-167 (2002)Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols., , , , и . IACR Cryptol. ePrint Arch., (2020)ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts., , , , и . ACM Conference on Computer and Communications Security, стр. 587-600. ACM, (2020)Secure enrollment and practical migration for mobile trusted execution environments., , , , и . SPSM@CCS, стр. 93-98. ACM, (2013)Secure Remote Execution of Sequential Computations., , и . ICICS, том 5927 из Lecture Notes in Computer Science, стр. 181-197. Springer, (2009)Self-organization in mobile ad hoc networks: the approach of Terminodes., , , , , и . IEEE Commun. Mag., 39 (6): 166-174 (2001)Low-power Distance Bounding., , и . CoRR, (2014)Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin., , и . IACR Cryptology ePrint Archive, (2012)Secure Ranging With Message Temporal Integrity., , и . IACR Cryptology ePrint Archive, (2009)Securing Cloud Data in the New Attacker Model., , , и . IACR Cryptology ePrint Archive, (2014)