From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Anonymous Mobility Management for Third Generation Mobile Networks., , и . Communications and Multimedia Security, том 70 из IFIP Conference Proceedings, стр. 72-83. Chapman & Hall, (1996)The Hitting Set Attack on Anonymity Protocols., и . Information Hiding, том 3200 из Lecture Notes in Computer Science, стр. 326-339. Springer, (2004)Experiences by Using AFFINE for Building Collaborative Applications for Online Communities., и . HCI (26), том 8029 из Lecture Notes in Computer Science, стр. 345-354. Springer, (2013)Supporting Distributed Decision Making Using Secure Distributed User Interfaces., , , , и . Distributed User Interfaces, Springer, (2011)Towards a causality based analysis of anonymity protection in indeterministic mix systems., и . Comput. Secur., (2017)Analyzing the Gold Star Scheme in a Split Tor Network., , и . SecureComm, том 96 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 77-95. Springer, (2011)Effect of Group Based Synchronization on User Anonymity in Mix Networks., и . ARES, стр. 146:1-146:9. ACM, (2023)iTLM-Q: A Constraint-Based Q-Learning Approach for Intelligent Traffic Light Management., , , , и . DATA (Revised Selected Papers), том 1446 из Communications in Computer and Information Science, стр. 56-79. Springer, (2020)iTLM: A Privacy Friendly Crowdsourcing Architecture for Intelligent Traffic Light Management., , , и . DATA, стр. 252-259. SciTePress, (2020)Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web., и . Sicherheit, том P-62 из LNI, стр. 233-244. GI, (2005)