From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities., , и . STM, том 8203 из Lecture Notes in Computer Science, стр. 65-81. Springer, (2013)CED2: Communication Efficient Disjointness Decision., , и . SecureComm, том 50 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 290-306. Springer, (2010)Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN., , , и . SecureComm, том 19 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 265-284. Springer, (2009)Covert Channel-Based Transmitter Authentication in Controller Area Networks., , , , и . CoRR, (2019)The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks., , , , и . WWIC, том 5546 из Lecture Notes in Computer Science, стр. 85-96. Springer, (2009)Time Warp: How Time Affects Privacy in LBSs., , , и . ICICS, том 6476 из Lecture Notes in Computer Science, стр. 325-339. Springer, (2010)Windows Mobile LiveSD Forensics., , , и . J. Netw. Comput. Appl., 36 (2): 677-684 (2013)ContextOS: A Context Aware Operating System for Mobile Devices., , и . GreenCom/iThings/CPScom, стр. 976-984. IEEE, (2013)Malware Signature Generation Using Locality Sensitive Hashing., , , , и . ISEA-ISAP, том 939 из Communications in Computer and Information Science, стр. 115-124. Springer, (2018)Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services., , , и . ICISSP, стр. 431-438. SciTePress, (2017)