From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion).. Security Protocols Workshop, том 7114 из Lecture Notes in Computer Science, стр. 33-48. Springer, (2011)SMAPs: Short Message Authentication Protocols., , , и . Security Protocols Workshop, том 10368 из Lecture Notes in Computer Science, стр. 119-132. Springer, (2016)The Correctness of Crypto Transaction Sets.. Security Protocols Workshop, том 2133 из Lecture Notes in Computer Science, стр. 125-127. Springer, (2000)The Correctness of Crypto Transaction Sets (Discussion).. Security Protocols Workshop, том 2133 из Lecture Notes in Computer Science, стр. 128-141. Springer, (2000)Liability and Computer Security: Nine Principles.. ESORICS, том 875 из Lecture Notes in Computer Science, стр. 231-245. Springer, (1994)Boosting Big Brother: Attacking Search Engines with Encodings., , , , и . RAID, стр. 700-713. ACM, (2023)PIN skimmer: inferring PINs through the camera and microphone., и . SPSM@CCS, стр. 67-78. ACM, (2013)Jikzi - a new framework for security policy, trusted publishing and electronic commerce., и . Comput. Commun., 23 (17): 1621-1626 (2000)Why Cryptosystems Fail.. ACM Conference on Computer and Communications Security, стр. 215-227. (1993)How Certification Systems Fail: Lessons from the Ware Report., , и . IEEE Secur. Priv., 10 (6): 40-44 (2012)