From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Key-assignment strategies for CPPM., и . MM&Sec, стр. 107-115. ACM, (2004)Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos.. IACR Cryptology ePrint Archive, (2013)DOMPurify: Client-Side Protection Against XSS and Markup Injection., , и . ESORICS (2), том 10493 из Lecture Notes in Computer Science, стр. 116-134. Springer, (2017)Public Key Encryption and Signature Schemes Based on Polynomials over Zn., и . EUROCRYPT, том 1070 из Lecture Notes in Computer Science, стр. 60-71. Springer, (1996)Waiting for CSP - Securing Legacy Web Applications with JSAgents., , и . ESORICS (1), том 9326 из Lecture Notes in Computer Science, стр. 23-42. Springer, (2015)Moderne Verfahren der Krypotgraphie - von RSA zu Zero-Knowledge (6. Aufl.)., , и . Vieweg, (2006)XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers., , , , и . CCS, стр. 1771-1788. ACM, (2021)Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web Browsers., , , , и . CCS, стр. 2456-2470. ACM, (2023)SAMLizing the European Citizen Card., , и . BIOSIG, том P-155 из LNI, стр. 105-116. GI, (2009)TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries., , , , , и . USENIX Security Symposium, стр. 215-232. USENIX Association, (2022)