From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy., , , и . AsiaCCS, стр. 196-207. ACM, (2022)Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN., , и . CANS, том 11261 из Lecture Notes in Computer Science, стр. 415-435. Springer, (2017)Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy., , и . IACR Cryptology ePrint Archive, (2019)Towards High-Interaction Virtual ICS Honeypots-in-a-Box., , и . CPS-SPC@CCS, стр. 13-22. ACM, (2016)LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks., , , , , , , и . USENIX Security Symposium, стр. 339-356. USENIX Association, (2021)BIAS: Bluetooth Impersonation AttackS., , и . SP, стр. 549-562. IEEE, (2020)Legacy-Compliant Data Authentication for Industrial Control System Traffic., , , и . ACNS, том 10355 из Lecture Notes in Computer Science, стр. 665-685. Springer, (2017)MiniCPS: A Toolkit for Security Research on CPS Networks., и . CPS-SPC@CCS, стр. 91-100. ACM, (2015)BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem., , , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (3): 330-366 (2022)Decentralized Privacy-Preserving Proximity Tracing., , , , , , , , , и 24 other автор(ы). CoRR, (2020)