From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security for E-Voting in Public Elections.. LISA, USENIX, (2001)Self-Protecting Electronic Medical Records Using Attribute-Based Encryption., , , , , и . IACR Cryptology ePrint Archive, (2010)Using Smartcards to Secure a Personalized Gambling Device., , и . ACM Conference on Computer and Communications Security, стр. 128-137. ACM, (1999)The architecture of robust publishing systems., , и . ACM Trans. Internet Techn., 1 (2): 199-230 (2001)Guest Editors' Introduction: E-Voting Security., и . IEEE Secur. Priv., 2 (1): 22-23 (2004)Firewalls and Internet security, , и . Addison-Wesley professional computing series Addison-Wesley, Boston, Mass. u.a., 2. ed издание, (2003)Securing electronic medical records using attribute-based encryption on mobile devices., , , , , и . SPSM@CCS, стр. 75-86. ACM, (2011)SocIoTy: Practical Cryptography in Smart Home Contexts., , , , , , , , и . Proc. Priv. Enhancing Technol., 2024 (1): 447-464 (января 2024)Trusted distribution of software over the Internet.. NDSS, стр. 47-53. IEEE Computer Society, (1995)A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy., , , , , и . UEMCON, стр. 303-308. IEEE, (2020)