Inproceedings,

Leaky Birds: Exploiting Mobile Application Traffic for Surveillance.

, , , and .
Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 367-384. Springer, (2016)

Meta data

Tags

Users

  • @dblp

Comments and Reviews