From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A natural language approach to automated cryptanalysis of two-time pads., , , и . CCS, стр. 235-244. ACM, (2006)Secure Deletion for a Versioning File System., , , , и . FAST, USENIX, (2005)An Algebraic Approach to IP Traceback., , и . NDSS, The Internet Society, (2001)Managing the Performance Impact of Web Security., , и . Electron. Commer. Res., 5 (1): 99-116 (2005)Using the Fluhrer, Mantin, and Shamir Attack to Break WEP., , и . NDSS, The Internet Society, (2002)To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads., , , , и . USENIX Security Symposium, стр. 171-184. USENIX Association, (2008)What Affects Citation Counts in MIS Research Articles? An Empirical Investigation., , и . Commun. Assoc. Inf. Syst., (2014)Security Analysis of a Cryptographically-Enabled RFID Device., , , , , и . USENIX Security Symposium, USENIX Association, (2005)Using Client Puzzles to Protect TLS., и . USENIX Security Symposium, USENIX, (2001)Reading Between the Lines: Lessons from the SDMI Challenge., , , , , , , и . USENIX Security Symposium, USENIX, (2001)