Author of the publication

No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position.

, , , , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 46-59. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Epidemic data survivability in unattended wireless sensor networks., and . WISEC, page 11-22. ACM, (2011)Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis., , , and . CODASPY, page 297-304. ACM, (2015)Role engineering: from theory to practice., , , and . CODASPY, page 181-192. ACM, (2012)A formal framework to elicit roles with business meaning in RBAC systems., , , and . SACMAT, page 85-94. ACM, (2009)Evaluating the Risk of Adopting RBAC Roles., , , and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 303-310. Springer, (2010)Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions., , and . SRDS, page 213-218. IEEE Computer Society, (2012)A Probabilistic Bound on the Basic Role Mining Problem and Its Applications., , , and . SEC, volume 297 of IFIP Advances in Information and Communication Technology, page 376-386. Springer, (2009)Taming role mining complexity in RBAC., , , and . Comput. Secur., 29 (5): 548-564 (2010)A business-driven decomposition methodology for role mining., , and . Comput. Secur., 31 (7): 844-855 (2012)STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports., , and . ARES, page 3:1-3:11. ACM, (2023)