From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Recurring Contingent Service Payment., , и . CoRR, (2022)Be Prepared: The EMV Preplay Attack., , , , и . IEEE Secur. Priv., 13 (2): 56-64 (2015)The Adblocking Tug-of-War., , , , , , , , и . login Usenix Mag., (2016)Message Splitting Against the Partial Adversary., и . Privacy Enhancing Technologies, том 3856 из Lecture Notes in Computer Science, стр. 26-39. Springer, (2005)Covert Channels for Collusion in Online Computer Games., и . Information Hiding, том 3200 из Lecture Notes in Computer Science, стр. 355-370. Springer, (2004)Securing network location awareness with authenticated DHCP., , и . SecureComm, стр. 391-402. IEEE, (2007)Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web., , , и . AsiaCCS, стр. 168-180. ACM, (2019)Transparency Enhancing Technologies to Make Security Protocols Work for Humans (Transcript of Discussion).. Security Protocols Workshop, том 12287 из Lecture Notes in Computer Science, стр. 11-19. Springer, (2019)Editors' Introduction., и . Proc. Priv. Enhancing Technol., 2015 (1): 1-3 (2015)How Certification Systems Fail: Lessons from the Ware Report., , и . IEEE Secur. Priv., 10 (6): 40-44 (2012)