From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Characterizing the Security of the SMS Ecosystem with Public Gateways., , , , , , и . ACM Trans. Priv. Secur., 22 (1): 2:1-2:31 (2019)Mitigating attacks on open functionality in SMS-capable cellular networks., , , и . IEEE/ACM Trans. Netw., 17 (1): 40-53 (2009)Non-Invasive Methods for Host Certification., , , , и . SecureComm, стр. 1-10. IEEE, (2006)Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services.. IEEE Trans. Mob. Comput., 11 (6): 983-994 (2012)FinTechSec: Addressing the Security Challenges of Digital Financial Services., , , и . IEEE Secur. Priv., 15 (5): 85-89 (2017)ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem., , , , , , , , , и 1 other автор(ы). USENIX Security Symposium, стр. 273-290. USENIX Association, (2018)Secure attribute-based systems., , , и . CCS, стр. 99-112. ACM, (2006)Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems., , , , , , и . SP, стр. 712-729. IEEE, (2021)Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services., , , , и . SOUPS, стр. 97-114. USENIX Association, (2017)Under New Management: Practical Attacks on SNMPv3., и . WOOT, USENIX Association, (2012)