From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Protecting browser state from web privacy attacks., , , и . WWW, стр. 737-744. ACM, (2006)Subspace: secure cross-domain communication for web mashups., и . WWW, стр. 611-620. ACM, (2007)MashupOS: Operating System Abstractions for Client Mashups., , , и . HotOS, USENIX Association, (2007)Securing Frame Communication in Browsers., , и . USENIX Security Symposium, стр. 17-30. USENIX Association, (2008)Protecting browsers from cross-origin CSS attacks., , , и . ACM Conference on Computer and Communications Security, стр. 619-629. ACM, (2010)Stronger Password Authentication Using Browser Extensions., , , , и . USENIX Security Symposium, USENIX Association, (2005)Cross-origin pixel stealing: timing attacks using CSS filters., , , и . ACM Conference on Computer and Communications Security, стр. 1055-1062. ACM, (2013)An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks., , , и . Financial Cryptography, том 4886 из Lecture Notes in Computer Science, стр. 281-293. Springer, (2007)Rootkits for JavaScript Environments., , и . WOOT, стр. 1-7. USENIX Association, (2009)All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API., , , , , и . IEEE Symposium on Security and Privacy, стр. 34-48. IEEE Computer Society, (2014)