From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tweakable Block Ciphers., , и . CRYPTO, том 2442 из Lecture Notes in Computer Science, стр. 31-46. Springer, (2002)A Large-Scale Study of Modern Code Review and Security in Open Source Projects., и . PROMISE, стр. 83-92. ACM, (2017)You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems., , , и . EVT, USENIX Association, (2008)Algebraic and Slide Attacks on KeeLoq., , и . FSE, том 5086 из Lecture Notes in Computer Science, стр. 97-115. Springer, (2008)Privacy and security in library RFID: issues, practices, and architectures., и . CCS, стр. 210-219. ACM, (2004)Adversarial Examples for k-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams., , , и . CoRR, (2020)Security considerations for IEEE 802.15.4 networks., и . Workshop on Wireless Security, стр. 32-42. ACM, (2004)Model Checking An Entire Linux Distribution for Security Violations., , , , , , и . ACSAC, стр. 13-22. IEEE Computer Society, (2005)Towards a privacy measurement criterion for voting systems., , , и . DG.O, том 89 из ACM International Conference Proceeding Series, стр. 287-288. Digital Government Research Center, (2005)Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)., , и . CQRE, том 1740 из Lecture Notes in Computer Science, стр. 192-203. Springer, (1999)