From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android., , , и . WISEC, стр. 49-60. ACM, (2016)Cache-Access Pattern Attack on Disaligned AES T-Tables., и . COSADE, том 7864 из Lecture Notes in Computer Science, стр. 200-214. Springer, (2013)SCAnDroid: Automated Side-Channel Analysis of Android APIs., , и . WISEC, стр. 224-235. ACM, (2018)Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices., , , и . IEEE Commun. Surv. Tutorials, 20 (1): 465-488 (2018)Adding Controllable Linkability to Pairing-Based Group Signatures for Free., , и . ISC, том 8783 из Lecture Notes in Computer Science, стр. 388-400. Springer, (2014)On the Applicability of Time-Driven Cache Attacks on Mobile Devices., и . NSS, том 7873 из Lecture Notes in Computer Science, стр. 656-662. Springer, (2013)Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches., , и . USENIX Security Symposium, стр. 897-912. USENIX Association, (2015)Group-signature schemes on constrained devices: the gap between theory and practice., и . CS2@HiPEAC, стр. 31-36. ACM, (2014)Automated Binary Analysis on iOS: A Case Study on Cryptographic Misuse in iOS Applications., , и . WISEC, стр. 236-247. ACM, (2018)PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices.. SPSM@CCS, стр. 51-62. ACM, (2014)