From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Achieving Keyless CDNs with Conclaves., , и . USENIX Security Symposium, стр. 735-751. USENIX Association, (2020)Zerocoin: Anonymous Distributed E-Cash from Bitcoin., , , и . IEEE Symposium on Security and Privacy, стр. 397-411. IEEE Computer Society, (2013)Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS., , и . USENIX Security Symposium, стр. 113-128. USENIX Association, (2015)Decentralized Anonymous Credentials., , и . NDSS, The Internet Society, (2014)Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity., , , и . Financial Cryptography Workshops, том 8438 из Lecture Notes in Computer Science, стр. 140-155. Springer, (2014)Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage., , , , и . USENIX Security Symposium, стр. 655-672. USENIX Association, (2016)HACCLE: metaprogramming for secure multi-party computation., , , , , , , , , и 10 other автор(ы). GPCE, стр. 130-143. ACM, (2021)Bento: Bringing Network Function Virtualization to Tor., , , , , и . ACM Conference on Computer and Communications Security, стр. 2109-2111. ACM, (2020)Bento: safely bringing network function virtualization to Tor., , , , , , и . SIGCOMM, стр. 821-835. ACM, (2021)Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor., , , , , , , , , и . ASPLOS (3), стр. 770-784. ACM, (2024)