From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Survey on Homomorphic Encryption Schemes: Theory and Implementation., , , и . CoRR, (2017)The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis., , , и . CoRR, (2017)Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion).. Security Protocols Workshop, том 7622 из Lecture Notes in Computer Science, стр. 214-222. Springer, (2012)DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions., , , , и . CoRR, (2015)Reliable Group Communication Protocol for Internet of Things., , и . CoRR, (2019)Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features., , , , , и . CoRR, (2019)SAFE^d: Self-Attestation For Networks of Heterogeneous Embedded Devices., , , и . CoRR, (2019)MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities., , и . STM, том 8203 из Lecture Notes in Computer Science, стр. 65-81. Springer, (2013)CED2: Communication Efficient Disjointness Decision., , и . SecureComm, том 50 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 290-306. Springer, (2010)Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN., , , и . SecureComm, том 19 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 265-284. Springer, (2009)