From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MalloryWorker: Stealthy Computation and Covert Channels Using Web Workers., , и . STM, том 9871 из Lecture Notes in Computer Science, стр. 196-211. Springer, (2016)KBID: Kerberos Bracelet Identification (Short Paper)., , и . Financial Cryptography, том 9603 из Lecture Notes in Computer Science, стр. 544-551. Springer, (2016)Applications of Secure Location Sensing in Healthcare., , , , и . BCB, стр. 58-67. ACM, (2016)Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage., , , , и . USENIX Security Symposium, стр. 655-672. USENIX Association, (2016)SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks., , , и . IEEE Symposium on Security and Privacy, стр. 524-539. IEEE Computer Society, (2014)