From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Independent Key Distribution Protocols for Broadcast Authentication., , , , и . SACMAT, стр. 27-38. ACM, (2018)An anonymous and failure resilient fair-exchange e-commerce protocol., , и . Decis. Support Syst., 39 (3): 267-292 (2005)Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components., и . Electron. Commer. Res. Appl., 7 (2): 247-259 (2008)Dynamic Security Risk Management Using Bayesian Attack Graphs., , и . IEEE Trans. Dependable Secur. Comput., 9 (1): 61-74 (2012)Secure Logging as a Service - Delegating Log Management to the Cloud., , , , и . IEEE Syst. J., 7 (2): 323-334 (2013)Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations., , , , и . DBSec, том 7964 из Lecture Notes in Computer Science, стр. 97-112. Springer, (2013)Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes., , , , и . DBSec, том 9766 из Lecture Notes in Computer Science, стр. 61-76. Springer, (2016)A Model for Trust-Based Access Control and Delegation in Mobile Clouds., , , и . DBSec, том 7964 из Lecture Notes in Computer Science, стр. 242-257. Springer, (2013)Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation., , и . iTrust, том 3986 из Lecture Notes in Computer Science, стр. 135-149. Springer, (2006)An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution., и . EC-Web, том 1875 из Lecture Notes in Computer Science, стр. 84-93. Springer, (2000)