From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Investigating Large Scale HTTPS Interception in Kazakhstan., , , , и . Internet Measurement Conference, стр. 125-132. ACM, (2020)Privacy management for portable recording devices., , и . WPES, стр. 16-24. ACM, (2004)Lest we remember: cold-boot attacks on encryption keys., , , , , , , , и . Commun. ACM, 52 (5): 91-98 (2009)A search engine for 3D models., , , , , , и . ACM Trans. Graph., 22 (1): 83-105 (2003)Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration Tools., , , и . Financial Cryptography, том 7035 из Lecture Notes in Computer Science, стр. 77-84. Springer, (2011)Improving the Security of United States Elections with Robust Optimization., , и . CoRR, (2023)Digital Rights Management, Spyware, and Security., и . IEEE Secur. Priv., 4 (1): 18-23 (2006)OpenVPN is Open to VPN Fingerprinting., , , , , , и . CoRR, (2024)Elliptic Curve Cryptography in Practice., , , , , и . Financial Cryptography, том 8437 из Lecture Notes in Computer Science, стр. 157-175. Springer, (2014)Lessons from the Sony CD DRM Episode., и . USENIX Security Symposium, USENIX Association, (2006)