From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Non-Invasive Methods for Host Certification., , , , и . SecureComm, стр. 1-10. IEEE, (2006)Mitigating attacks on open functionality in SMS-capable cellular networks., , , и . IEEE/ACM Trans. Netw., 17 (1): 40-53 (2009)Secure attribute-based systems., , , и . CCS, стр. 99-112. ACM, (2006)ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem., , , , , , , , , и 1 other автор(ы). USENIX Security Symposium, стр. 273-290. USENIX Association, (2018)Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems., , , , , , и . SP, стр. 712-729. IEEE, (2021)Under New Management: Practical Attacks on SNMPv3., и . WOOT, USENIX Association, (2012)A Hybrid Approach to Secure Function Evaluation using SGX., , , , , , , и . AsiaCCS, стр. 100-113. ACM, (2019)On cellular botnets: measuring the impact of malicious devices on a cellular network core., , , , , , и . CCS, стр. 223-234. ACM, (2009)Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers., , , , , , и . IEEE Symposium on Security and Privacy, стр. 1000-1014. IEEE, (2019)Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services., , , , и . SOUPS, стр. 97-114. USENIX Association, (2017)