From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps., , и . AsiaCCS, стр. 591-596. ACM, (2015)The Linear Arboricity of Planar Graphs without 5-, 6-Cycles with Chords., , , и . Graphs Comb., 29 (3): 373-385 (2013)The linear arboricity of planar graphs with no short cycles., , и . Theor. Comput. Sci., 381 (1-3): 230-233 (2007)Graphs are (1, Δ+1)-choosable., , , , , , и . Discret. Math., 342 (1): 279-284 (2019)LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks., , , , , , , и . USENIX Security Symposium, стр. 339-356. USENIX Association, (2021)The Equitable Edge-Coloring of Series-Parallel Graphs., , и . International Conference on Computational Science (3), том 4489 из Lecture Notes in Computer Science, стр. 457-460. Springer, (2007)Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities., , , , и . SP, стр. 2285-2303. IEEE, (2022)Acyclic Edge Coloring of Planar Graphs Without Small Cycles., , и . Graphs Comb., 28 (2): 215-226 (2012)BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy., , , , , , и . WOOT @ USENIX Security Symposium, USENIX Association, (2020)ProFactory: Improving IoT Security via Formalized Protocol Customization., , , , , , и . USENIX Security Symposium, стр. 3879-3896. USENIX Association, (2022)