From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Can they hear me now?: a security analysis of law enforcement wiretaps, , , , и . CCS 2009: Proceedings of the 16th ACM conference on Computer and communications security, стр. 512--523. New York, NY, USA, ACM, (2009)Measurable Security through Isotropic Channels (Transcript of Discussion).. Security Protocols Workshop, том 5964 из Lecture Notes in Computer Science, стр. 13-19. Springer, (2007)Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion)., и . Security Protocols Workshop, том 9379 из Lecture Notes in Computer Science, стр. 91-104. Springer, (2015)Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones., и . Security Protocols Workshop, том 9379 из Lecture Notes in Computer Science, стр. 80-90. Springer, (2015)Security Evaluation of ES&S Voting Machines and Election Management System., , , , , , и . EVT, USENIX Association, (2008)Identifying individual vulnerability based on public data., , и . PST, стр. 119-126. IEEE Computer Society, (2013)Sensor Network Security: More Interesting Than You Think., , , , и . HotSec, USENIX Association, (2006)Eavesdropping.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)NetTrails: a declarative platform for maintaining and querying provenance in distributed systems., , , , , , , и . SIGMOD Conference, стр. 1323-1326. ACM, (2011)Towards Application-Aware Anonymous Routing., , и . HotSec, USENIX Association, (2007)