From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Where's Wally?: Precise User Discovery Attacks in Location Proximity Services., , , , и . ACM Conference on Computer and Communications Security, стр. 817-828. ACM, (2015)Blueprints for a Large-Scale Early Warning System., , , , , , , и . Panhellenic Conference on Informatics, стр. 7-11. IEEE Computer Society, (2010)HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS Implementations., , , , и . IEEE Symposium on Security and Privacy, стр. 521-538. IEEE Computer Society, (2017)Evaluating the Privacy Guarantees of Location Proximity Services., , , , и . ACM Trans. Priv. Secur., 19 (4): 12:1-12:31 (2017)I Forgot Your Password: Randomness Attacks Against PHP Applications., и . USENIX Security Symposium, стр. 81-96. USENIX Association, (2012)The Learnability of Symbolic Automata., и . CAV (1), том 10981 из Lecture Notes in Computer Science, стр. 427-445. Springer, (2018)SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning., , , , и . CCS, стр. 1690-1701. ACM, (2016)Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters., , , и . IEEE Symposium on Security and Privacy, стр. 91-109. IEEE Computer Society, (2016)Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks., , , и . ESORICS (2), том 11736 из Lecture Notes in Computer Science, стр. 565-585. Springer, (2019)