From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Every Signature is Broken: On the Insecurity of Microsoft Office's OOXML Signatures., , , , и . USENIX Security Symposium, стр. 7411-7428. USENIX Association, (2023)Over 100 Bugs in a Row: Security Analysis of the Top-Rated Joomla Extensions., , , и . CoRR, (2021)Office Document Security and Privacy., , , , , и . WOOT @ USENIX Security Symposium, USENIX Association, (2020)Practical Decryption exFiltration: Breaking PDF Encryption., , , , , и . CCS, стр. 15-29. ACM, (2019)Die Financial-grade API (FAPI)., и . Datenschutz und Datensicherheit (dud), 47 (3): 154-159 (марта 2023)Shadow Attacks: Hiding and Replacing Content in Signed PDFs., , и . NDSS, The Internet Society, (2021)Breaking the Specification: PDF Certification., , , и . SP, стр. 1485-1501. IEEE, (2021)Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures., , , и . USENIX Security Symposium, стр. 3075-3092. USENIX Association, (2022)More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema., , и . EuroS&P, стр. 415-429. IEEE, (2018)SSO-Monitor: Fully-Automatic Large-Scale Landscape, Security, and Privacy Analyses of Single Sign-On in the Wild., , , , , и . CoRR, (2023)