From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Implementation of a High Assurance Smart Meter Using Protected Module Architectures., , , , , и . WISTP, том 9895 из Lecture Notes in Computer Science, стр. 53-69. Springer, (2016)Bitsquatting: exploiting bit-flips for fun, or profit?, , , , , и . WWW, стр. 989-998. International World Wide Web Conferences Steering Committee / ACM, (2013)Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems., , , и . SC@ETAPS, том 4089 из Lecture Notes in Computer Science, стр. 34-49. Springer, (2006)Abstract Congruence Criteria for Weak Bisimilarity., , , и . CoRR, (2020)Practical verification of WPA-TKIP vulnerabilities., и . AsiaCCS, стр. 427-436. ACM, (2013)Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals., , , и . ACM Conference on Computer and Communications Security, стр. 918-929. ACM, (2014)Linear capabilities for fully abstract compilation of separation-logic-verified code., , и . Proc. ACM Program. Lang., 3 (ICFP): 84:1-84:29 (2019)Secure End-to-End Sensing in Supply Chains., , , , , и . CNS, стр. 1-6. IEEE, (2020)Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting., , , , , и . IEEE Symposium on Security and Privacy, стр. 541-555. IEEE Computer Society, (2013)Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2., и . CCS, стр. 1313-1328. ACM, (2017)