From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Chain reduction of authorisation certificates., , , и . Int. J. Secur. Networks, 10 (2): 107-123 (2015)Threshold-Based Registration (TBR) in Mobile IPv6., , , и . Mobile and Wireless Communication Networks, том 1818 из Lecture Notes in Computer Science, стр. 150-157. Springer, (2000)Scheduling Policies for Fault Tolerance in a VLSI Processor., , , и . DFT, стр. 1-9. IEEE Computer Society, (1994)A Cryptographic and Key Management Glance at Cybersecurity Challenges of the Future European Railway System., , , и . CyCom, стр. 265-284. IEEE, (2022)On a new approach for enhancing the fault coverage of conformance testing of protocols., , и . SPDP, стр. 428-435. IEEE Computer Society, (1991)Repair algorithms for mirrored disk systems., , , и . DFT, стр. 216-224. IEEE Computer Society, (1995)On the Methods to Detect Sector Faults of a Disk Subsystem., , и . MASCOTS, стр. 317-322. The Society for Computer Simulation, (1993)Scenario-driven design considerations for MANET protocols (short paper)., , и . DAIS, том 143 из IFIP Conference Proceedings, стр. 205-212. Kluwer, (1999)Conformance Testing of CORBA Services Using TTCN., , , и . TestCom, том 176 из IFIP Conference Proceedings, стр. 193-. Kluwer, (2000)Controlling Incoming Connections Using Certificates and Distributed Hash Tables., и . NEW2AN, том 4712 из Lecture Notes in Computer Science, стр. 455-467. Springer, (2007)