From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Preventing SIM Box Fraud Using Device Model Fingerprinting., , , , , , и . NDSS, The Internet Society, (2023)GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier., , и . NDSS, The Internet Society, (2018)Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous., , , и . NDSS, The Internet Society, (2012)One-Way Indexing for Plausible Deniability in Censorship Resistant Storage., , , и . FOCI, USENIX Association, (2012)Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE., , , , , и . USENIX Security Symposium, стр. 55-72. USENIX Association, (2019)Frying PAN: Dissecting Customized Protocol for Personal Area Network., , , , и . WISA, том 9503 из Lecture Notes in Computer Science, стр. 300-312. Springer, (2015)Secure Group Services for Storage Area Networks., , , и . IEEE Security in Storage Workshop, стр. 80-93. IEEE Computer Society, (2002)Combating Double-Spending Using Cooperative P2P Systems., , , и . ICDCS, стр. 41. IEEE Computer Society, (2007)LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper., , , , , , , и . WISEC, стр. 43-48. ACM, (2023)Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications., , , и . CHES, том 10529 из Lecture Notes in Computer Science, стр. 445-467. Springer, (2017)