From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions., , , , , и . Advances in Cyber Security, Springer, (2019)Cryptography as an operating system service: A case study., , , и . ACM Trans. Comput. Syst., 24 (1): 1-38 (2006)That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing Mechanisms., , и . WPES@CCS, стр. 71-81. ACM, (2016)IntFlow: improving the accuracy of arithmetic error detection using information flow tracking., , , , и . ACSAC, стр. 416-425. ACM, (2014)Self-healing multitier architectures using cascading rescue points., , и . ACSAC, стр. 379-388. ACM, (2012)Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs., , и . Inscrypt, том 5487 из Lecture Notes in Computer Science, стр. 157-180. Springer, (2008)CryptoGraphics: Secret Key Cryptography Using Graphics Cards., , , и . CT-RSA, том 3376 из Lecture Notes in Computer Science, стр. 334-350. Springer, (2005)Pushback for Overlay Networks: Protecting Against Malicious Insiders., , и . ACNS, том 5037 из Lecture Notes in Computer Science, стр. 39-54. (2008)W3Bcrypt: Encryption as a Stylesheet., , и . ACNS, том 3989 из Lecture Notes in Computer Science, стр. 349-364. (2006)Low Latency Anonymity with Mix Rings., и . ISC, том 4176 из Lecture Notes in Computer Science, стр. 32-45. Springer, (2006)