From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective., , и . ESORICS, том 6879 из Lecture Notes in Computer Science, стр. 548-567. Springer, (2011)On the Age of Pseudonyms in Mobile Ad Hoc Networks., , , и . INFOCOM, стр. 1577-1585. IEEE, (2010)Scalable Privacy-Preserving Distributed Learning., , , , , , и . Proc. Priv. Enhancing Technol., 2021 (2): 323-347 (2021)On genomics, kin, and privacy., , и . F1000Research, (2014)Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels., , , , , и . IEEE Trans. Dependable Secur. Comput., 5 (4): 208-223 (2008)Key Agreement in Peer-to-Peer Wireless Networks., , и . Proc. IEEE, 94 (2): 467-478 (2006)Revocation games in ephemeral networks., , , и . ACM Conference on Computer and Communications Security, стр. 199-210. ACM, (2008)SOWER: self-organizing wireless network for messaging., , и . WMASH, стр. 1-10. ACM, (2004)A New System Engineering Methodology Coupling Formal Specification and Performance Evaluation., и . FME, том 1051 из Lecture Notes in Computer Science, стр. 140-159. Springer, (1996)TINA service validation: the ErnesTINA project., , и . ICC, стр. 1150-1154. IEEE, (1998)