From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security considerations for IEEE 802.15.4 networks., и . Workshop on Wireless Security, стр. 32-42. ACM, (2004)Model Checking An Entire Linux Distribution for Security Violations., , , , , , и . ACSAC, стр. 13-22. IEEE Computer Society, (2005)Towards a privacy measurement criterion for voting systems., , , и . DG.O, том 89 из ACM International Conference Proceeding Series, стр. 287-288. Digital Government Research Center, (2005)Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)., , и . CQRE, том 1740 из Lecture Notes in Computer Science, стр. 192-203. Springer, (1999)Fault Attacks on Dual-Rail Encoded Systems., и . ACSAC, стр. 483-494. IEEE Computer Society, (2005)From Weak to Strong Watermarking., , и . TCC, том 4392 из Lecture Notes in Computer Science, стр. 362-382. Springer, (2007)On the Robustness of Deep K-Nearest Neighbors., и . IEEE Symposium on Security and Privacy Workshops, стр. 1-7. IEEE, (2019)Tweakable Block Ciphers., , и . CRYPTO, том 2442 из Lecture Notes in Computer Science, стр. 31-46. Springer, (2002)A Large-Scale Study of Modern Code Review and Security in Open Source Projects., и . PROMISE, стр. 83-92. ACM, (2017)You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems., , , и . EVT, USENIX Association, (2008)