From post

Efficient authentication and verification of certificate status within public-key infrastructures.

, и . Communications, Internet, and Information Technology, стр. 182-188. IASTED/ACTA Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Application of Efficient Certificate Status Handling Methods to High Traffic Authentication Services., и . ISCC, стр. 821-827. IEEE Computer Society, (2003)A General Methodology for Robotic Haptic Recognition of 3-D Objects., и . ICEIS, стр. 203-210. (1999)Blocking time under basic priority inheritance: Polynomial bound and exact computation., , и . CoRR, (2018)Confining the Insider Threat in Mass Virtual Hosting Systems., , и . WOSIS, стр. 105-114. INSTICC Press, (2007)A hybrid system for knowledge-based synthesis of robot grasps., , , и . IROS, стр. 1575-1581. IEEE, (1993)Efficient authentication and verification of certificate status within public-key infrastructures., и . Communications, Internet, and Information Technology, стр. 182-188. IASTED/ACTA Press, (2004)Precise Worst-Case Blocking Time of Tasks Under Priority Inheritance Protocol., и . IEEE Trans. Computers, 70 (11): 1901-1913 (2021)A flexible scheme for on-line public-key certificate status updating and verification., и . ISCC, стр. 891-898. IEEE Computer Society, (2002)MININET: A Local Area Network for Real-Time Instrumentation Applications., , , , , и . Comput. Networks, (1984)Architectural design patterns for logic control of manufacturing systems: The generalized device., , , , и . ICAT, стр. 1-7. IEEE, (2009)