From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

S-search: finding RFID tags using scalable and secure search protocol., , и . SAC, стр. 439-443. ACM, (2010)Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments., , , , и . J. Syst. Softw., 83 (2): 253-270 (2010)aBBRate: Automating BBR Attack Exploration Using a Model-Based Approach., , , , и . RAID, стр. 225-240. USENIX Association, (2020)Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime., , , и . WISEC, стр. 73-84. ACM, (2023)ERAP: ECC Based RFID Authentication Protocol., , и . FTDCS, стр. 219-225. IEEE Computer Society, (2008)AnonPri: An efficient anonymous private authentication protocol., , и . PerCom, стр. 102-110. IEEE, (2011)Preserving User Privacy in Pervasive Environments with a Collaborative Model., , , и . SERE (Companion), стр. 84-93. IEEE, (2013)Automated Adversarial Testing of Unmodified Wireless Routing Implementations., , , , и . IEEE/ACM Trans. Netw., 24 (6): 3369-3382 (2016)Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations., , , , и . ICDCS, стр. 660-669. IEEE Computer Society, (2014)A formal security analysis of ZigBee (1.0 and 3.0)., , и . HotSoS, стр. 12:1-12:11. ACM, (2020)