From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How voice calls affect data in operational LTE networks., , , , и . MobiCom, стр. 87-98. ACM, (2013)Can we pay for what we get in 3G data access?, , , и . MobiCom, стр. 113-124. ACM, (2012)BFastPay: A Routing-free Protocol for Fast Payment in Bitcoin Network., , , и . CODASPY, стр. 77-87. ACM, (2021)When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities., , , , , , , , , и 2 other автор(ы). CNS, стр. 1-9. IEEE, (2023)Uncovering insecure designs of cellular emergency services (911)., , , , , , , , , и 1 other автор(ы). MobiCom, стр. 703-715. ACM, (2022)iCellular: Device-Customized Cellular Network Access on Commodity Smartphones., , , , , , и . NSDI, стр. 643-656. USENIX Association, (2016)Remote Detection of 4G/5G UEs Vulnerable to Stealthy Call DoS., , , , и . INFOCOM Workshops, стр. 1-2. IEEE, (2023)The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures., , , , , , , и . CoRR, (2018)iCellular: Define Your Own Cellular Network Access on Commodity Smartphones., , , , , , и . CoRR, (2015)New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks., , , , и . CCS, стр. 1118-1130. ACM, (2016)