From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities., , , , и . CoRR, (2014)On the Usability of HTTPS Deployment., , , , , и . CHI, стр. 310. ACM, (2019)Technical perspective - Native Client: a clever alternative.. Commun. ACM, 53 (1): 90 (2010)Rebooting the CS publication process.. Commun. ACM, 54 (10): 32-35 (2011)Practical Robust Localization over Large-Scale 802.11 Wireless Networks, , , , , и . Proceedings of the Tenth ACM International Conference on Mobile Computing and Networking (MOBICOM), (2002)Puppeteer: Component-based Adaptation for Mobile Computing, , и . In Proceedings of the 3rd Usenix Symposium on Internet Technologies and Systems, стр. 159--170. (2000)Robotics-based location sensing using wireless ethernet., , , , , и . MobiCom, стр. 227-238. ACM, (2002)Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching., , , , и . IEEE Trans. Emerg. Top. Comput., 2 (1): 37-49 (2014)SAFKASI: a security mechanism for language-based systems., , и . ACM Trans. Softw. Eng. Methodol., 9 (4): 341-378 (2000)Bad Tools Hurt: Lessons for teaching computer security skills to undergraduates., , , и . Int. J. Comput. Sci. Educ. Sch., 5 (2): 74-92 (2021)