From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System., , , и . IEEE Trans. Dependable Secur. Comput., 12 (3): 312-325 (2015)Modelo de Seguridad en Bases de Datos: Autenticación Mediante Contraseñas de Un Solo Uso y Cifrado Mediante un Sistema Pseudo-asimétrico., , и . JIDBD, стр. 189-190. Universidad Carlos III de Madrid, (1997)A Legal Ontology to Support Privacy Preservation in Location-Based Services., , , и . OTM Workshops (2), том 4278 из Lecture Notes in Computer Science, стр. 1755-1764. Springer, (2006)Extended electronic signature policies., , , и . SIN, стр. 268-277. ACM, (2009)Formal Validation of OFEPSP+ with AVISPA., , и . ARSPA-WITS, том 5511 из Lecture Notes in Computer Science, стр. 124-137. Springer, (2009)Project WebOracle: Developing an advanced web server security assesment tool., , , , и . WebNet, стр. 526-529. AACE, (2001)Path-Stamps: A Proposal for Enhancing Security of Location Tracking Applications., , и . CAiSE Workshops, том 75 из CEUR Workshop Proceedings, CEUR-WS.org, (2003)Providing Personalization and Automation to Spatial-Temporal Stamping Services., , , и . DEXA Workshops, стр. 219-225. IEEE Computer Society, (2005)Search Engines as a security thread., , , и . WebNet, стр. 530-533. AACE, (2001)Leveraging Quiz-based Multiple-prize Web Tournaments for Reinforcing Routine Mathematical Skills., , , и . J. Educ. Technol. Soc., 16 (3): 28-43 (2013)