From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How Can IoT Services Pose New Security Threats In Operational Cellular Networks?, , , и . IEEE Trans. Mob. Comput., 20 (8): 2592-2606 (2021)MPKIX: Towards More Accountable and Secure Internet Application Services via Mobile Networked Systems., , , , , и . IEEE Trans. Mob. Comput., 22 (6): 3489-3507 (июня 2023)The Insecurity of Home Digital Voice Assistants - Amazon Alexa as a Case Study., , , , и . CoRR, (2017)BFastPay: A Routing-free Protocol for Fast Payment in Bitcoin Network., , , и . CODASPY, стр. 77-87. ACM, (2021)When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities., , , , , , , , , и 2 other автор(ы). CNS, стр. 1-9. IEEE, (2023)Uncovering insecure designs of cellular emergency services (911)., , , , , , , , , и 1 other автор(ы). MobiCom, стр. 703-715. ACM, (2022)Remote Detection of 4G/5G UEs Vulnerable to Stealthy Call DoS., , , , и . INFOCOM Workshops, стр. 1-2. IEEE, (2023)iCellular: Device-Customized Cellular Network Access on Commodity Smartphones., , , , , , и . NSDI, стр. 643-656. USENIX Association, (2016)How voice calls affect data in operational LTE networks., , , , и . MobiCom, стр. 87-98. ACM, (2013)Can we pay for what we get in 3G data access?, , , и . MobiCom, стр. 113-124. ACM, (2012)