From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Device Analyzer: Understanding Smartphone Usage., , и . MobiQuitous, том 131 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 195-208. Springer, (2013)Reconstruction of Battery Level Curves Based on User Data Collected from a Smartphone., , и . AIMSA, том 9883 из Lecture Notes in Computer Science, стр. 289-298. Springer, (2016)Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees., , , и . CCS, стр. 2024-2045. ACM, (2021)OpSets: Sequential Specifications for Replicated Datatypes., , , и . Arch. Formal Proofs, (2018)Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices., , и . Security Protocols Workshop, том 14186 из Lecture Notes in Computer Science, стр. 78-88. Springer, (2023)Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones., и . USENIX Security Symposium, стр. 5431-5448. USENIX Association, (2023)Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks., , и . USENIX Security Symposium, стр. 3433-3450. USENIX Association, (2021)Dependability and Accountability for Context-aware Middleware Systems., и . PerCom Workshops, стр. 378-382. IEEE Computer Society, (2006)SoK: Web Authentication in the Age of End-to-End Encryption., , , и . CoRR, (2024)Mobile App Distribution Transparency (MADT): Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution Systems., , , и . NordSec, том 14324 из Lecture Notes in Computer Science, стр. 185-203. Springer, (2023)