From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Why Cryptosystems Fail.. ACM Conference on Computer and Communications Security, стр. 215-227. (1993)PIN skimmer: inferring PINs through the camera and microphone., и . SPSM@CCS, стр. 67-78. ACM, (2013)Jikzi - a new framework for security policy, trusted publishing and electronic commerce., и . Comput. Commun., 23 (17): 1621-1626 (2000)Threat Models over Space and Time: A Case Study of E2EE Messaging Applications., , , , , , , и . CoRR, (2023)Security economics: a personal perspective.. ACSAC, стр. 139-144. ACM, (2012)Liability and Computer Security: Nine Principles.. ESORICS, том 875 из Lecture Notes in Computer Science, стр. 231-245. Springer, (1994)Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion).. Security Protocols Workshop, том 7114 из Lecture Notes in Computer Science, стр. 33-48. Springer, (2011)SMAPs: Short Message Authentication Protocols., , , и . Security Protocols Workshop, том 10368 из Lecture Notes in Computer Science, стр. 119-132. Springer, (2016)The Correctness of Crypto Transaction Sets.. Security Protocols Workshop, том 2133 из Lecture Notes in Computer Science, стр. 125-127. Springer, (2000)The Correctness of Crypto Transaction Sets (Discussion).. Security Protocols Workshop, том 2133 из Lecture Notes in Computer Science, стр. 128-141. Springer, (2000)