From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks., , и . USENIX Security Symposium, стр. 3433-3450. USENIX Association, (2021)Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones., и . USENIX Security Symposium, стр. 5431-5448. USENIX Association, (2023)Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices., , и . Security Protocols Workshop, том 14186 из Lecture Notes in Computer Science, стр. 78-88. Springer, (2023)Device Analyzer: Understanding Smartphone Usage., , и . MobiQuitous, том 131 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 195-208. Springer, (2013)Reconstruction of Battery Level Curves Based on User Data Collected from a Smartphone., , и . AIMSA, том 9883 из Lecture Notes in Computer Science, стр. 289-298. Springer, (2016)OpSets: Sequential Specifications for Replicated Datatypes., , , и . Arch. Formal Proofs, (2018)Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees., , , и . CCS, стр. 2024-2045. ACM, (2021)Dependability and Accountability for Context-aware Middleware Systems., и . PerCom Workshops, стр. 378-382. IEEE Computer Society, (2006)SoK: Web Authentication in the Age of End-to-End Encryption., , , и . CoRR, (2024)A Conflict-Free Replicated JSON Datatype., и . CoRR, (2016)