From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Securely Making "Things" Right., , и . Computer, 48 (9): 84-88 (2015)Building Security into Off-the-Shelf Smartphones., , , и . Computer, 45 (2): 82-84 (2012)Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing., , , , , , , и . IACR Cryptol. ePrint Arch., (2020)Activity Spoofing and Its Defense in Android Smartphones., , и . ACNS, том 8479 из Lecture Notes in Computer Science, стр. 494-512. Springer, (2014)Return Value Predictability Profiles for Self-healing., , , , и . IWSEC, том 5312 из Lecture Notes in Computer Science, стр. 152-166. Springer, (2008)Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users., , , и . RAID, том 9404 из Lecture Notes in Computer Science, стр. 405-424. Springer, (2015)Adaptive Anomaly Detection via Self-calibration and Dynamic Updating., , , и . RAID, том 5758 из Lecture Notes in Computer Science, стр. 41-60. Springer, (2009)Exposing Security Risks for Commercial Mobile Devices., , , и . MMM-ACNS, том 7531 из Lecture Notes in Computer Science, стр. 3-21. Springer, (2012)NetGator: Malware Detection Using Program Interactive Challenges., , , и . DIMVA, том 7591 из Lecture Notes in Computer Science, стр. 164-183. Springer, (2012)transAD: An Anomaly Detection Network Intrusion Sensor for the Web., , , , и . ISC, том 8783 из Lecture Notes in Computer Science, стр. 477-489. Springer, (2014)