From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers., , , и . ARES, стр. 38:1-38:10. ACM, (2018)Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel., , , и . MoMM, стр. 147-156. ACM, (2014)CORMORANT: Ubiquitous Risk-Aware Multi-Modal Biometric Authentication across Mobile Devices., , , , , , , и . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (3): 85:1-85:23 (2019)Optimizing Distributed Face Recognition Systems through Efficient Aggregation of Facial Embeddings., , , и . Adv. Artif. Intell. Mach. Learn., 3 (1): 693-711 (2023)Practical Delegatable Anonymous Credentials From Equivalence Class Signatures., , , и . IACR Cryptol. ePrint Arch., (2022)Diversity in locked and unlocked mobile device usage., , , , и . UbiComp Adjunct, стр. 379-384. ACM, (2014)On the state of V3 onion services., , и . FOCI@SIGCOMM, стр. 50-56. ACM, (2021)Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models., и . MoMM, стр. 288-291. ACM, (2016)The Android Platform Security Model., , , и . CoRR, (2019)Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices., , и . MoMM, стр. 249. ACM, (2013)