From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Deletion on Log-structured File Systems, , , и . CoRR, (2011)Influence of user perception, security needs, and social factors on device pairing method choices., , , и . SOUPS, том 485 из ACM International Conference Proceeding Series, ACM, (2010)Integrity regions: authentication through presence in wireless networks., и . Workshop on Wireless Security, стр. 1-10. ACM, (2006)Securing Cloud Data in the New Attacker Model., , , и . IACR Cryptology ePrint Archive, (2014)Investigation of Signal and Message Manipulations on the Wireless Channel., , , и . ESORICS, том 6879 из Lecture Notes in Computer Science, стр. 40-59. Springer, (2011)Jamming Resistance.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Secure enrollment and practical migration for mobile trusted execution environments., , , , и . SPSM@CCS, стр. 93-98. ACM, (2013)ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts., , , , и . ACM Conference on Computer and Communications Security, стр. 587-600. ACM, (2020)Self-organization in mobile ad hoc networks: the approach of Terminodes., , , , , и . IEEE Commun. Mag., 39 (6): 166-174 (2001)AdaptOver : Adaptive Overshadowing of LTE signals., , , , и . CoRR, (2021)