From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards quantification of firewall policy complexity., , , , и . HotSoS, стр. 18:1-18:2. ACM, (2015)The privacy in the time of the internet: secrecy vs transparency., , , , , и . CODASPY, стр. 133-140. ACM, (2012)A Case Study on Runtime Monitoring of an Autonomous Research Vehicle (ARV) System., , , и . RV, том 9333 из Lecture Notes in Computer Science, стр. 102-117. Springer, (2015)All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations., , , , , , , , , и . CCS, стр. 1100-1117. ACM, (2021)On Re-engineering the X.509 PKI with Executable Specification for Better Implementation Guarantees., , и . CCS, стр. 1388-1404. ACM, (2021)Toward practical authorization-dependent user obligation systems., , , , и . AsiaCCS, стр. 180-191. ACM, (2010)On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols., , , , и . CCS, стр. 603-615. ACM, (2016)Failure Feedback for User Obligation Systems., , , , и . SocialCom/PASSAT, стр. 713-720. IEEE Computer Society, (2010)Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs., , , , и . DSN, стр. 627-638. IEEE Computer Society, (2017)5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol., , , , и . ACM Conference on Computer and Communications Security, стр. 669-684. ACM, (2019)