From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems., , , и . SKM, том 1549 из Communications in Computer and Information Science, стр. 151-170. Springer, (2021)Papers, Please... - X.509 Certificate Revocation in Practice., и . DCNET, стр. 36-40. SciTePress, (2014)Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks., , , , и . CANS, том 5339 из Lecture Notes in Computer Science, стр. 349-365. Springer, (2008)Secure Key Management in Embedded Systems: A First Proposal., , и . IoTBDS, стр. 81-91. SCITEPRESS, (2021)What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility., , , , , и . ICETE (Selected Papers), том 585 из Communications in Computer and Information Science, стр. 58-78. Springer, (2015)The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSA., , и . ICETE (Selected Papers), том 222 из Communications in Computer and Information Science, стр. 71-83. Springer, (2010)Token-based Authentication for Smartphones., , , и . DCNET/ICE-B/OPTICS, стр. 51-56. SciTePress, (2013)Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography., , , , и . ICETE (Selected Papers), том 314 из Communications in Computer and Information Science, стр. 74-81. Springer, (2011)Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller., , , , , , и . CHES, том 4249 из Lecture Notes in Computer Science, стр. 430-444. Springer, (2006)Smart Elliptic Curve Cryptography for Smart Dust., , , , и . QSHINE, том 74 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 623-634. Springer, (2010)