From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enforcing service availability in mobile ad-hoc WANs., и . MobiHoc, стр. 87-96. IEEE, (2000)Problem Domain Analysis of IoT-Driven Secure Data Markets., и . Euro-CYBERSEC, том 821 из Communications in Computer and Information Science, стр. 57-67. Springer, (2018)The quest for security in mobile ad hoc networks., , и . MobiHoc, стр. 146-155. ACM, (2001)Protecting the Itinerary of Mobile Agents., , и . ECOOP Workshops, том 1543 из Lecture Notes in Computer Science, стр. 301. Springer, (1998)A Pessimistic Approach to Trust in Mobile Agent Platforms., , и . IEEE Internet Comput., 4 (5): 40-48 (2000)A survey of security issues in hardware virtualization., , и . ACM Comput. Surv., 45 (3): 40:1-40:34 (2013)The Cost of Having Been Pwned: A Security Service Provider's Perspective., , , , и . ETAA@ESORICS, том 12515 из Lecture Notes in Computer Science, стр. 154-167. Springer, (2020)SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains., , и . ICC, стр. 2073-2078. IEEE, (2013)XCS based hidden firmware modification on embedded devices., , и . SoftCOM, стр. 1-5. IEEE, (2011)Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases., и . TrustBus, том 7449 из Lecture Notes in Computer Science, стр. 192-206. Springer, (2012)