From post

On the Reliability of Network Eavesdropping Tools.

, , и . IFIP Int. Conf. Digital Forensics, том 222 из IFIP Advances in Information and Communication Technology, стр. 199-213. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Can they hear me now?: a security analysis of law enforcement wiretaps, , , , и . CCS 2009: Proceedings of the 16th ACM conference on Computer and communications security, стр. 512--523. New York, NY, USA, ACM, (2009)Eavesdropping.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Measurable Security through Isotropic Channels (Transcript of Discussion).. Security Protocols Workshop, том 5964 из Lecture Notes in Computer Science, стр. 13-19. Springer, (2007)Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion)., и . Security Protocols Workshop, том 9379 из Lecture Notes in Computer Science, стр. 91-104. Springer, (2015)Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones., и . Security Protocols Workshop, том 9379 из Lecture Notes in Computer Science, стр. 80-90. Springer, (2015)Security Evaluation of ES&S Voting Machines and Election Management System., , , , , , и . EVT, USENIX Association, (2008)Sensor Network Security: More Interesting Than You Think., , , , и . HotSec, USENIX Association, (2006)Identifying individual vulnerability based on public data., , и . PST, стр. 119-126. IEEE Computer Society, (2013)NetTrails: a declarative platform for maintaining and querying provenance in distributed systems., , , , , , , и . SIGMOD Conference, стр. 1323-1326. ACM, (2011)Towards Application-Aware Anonymous Routing., , и . HotSec, USENIX Association, (2007)