From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security and Privacy Issues in E-passports., , и . SecureComm, стр. 74-88. IEEE, (2005)Adversarially Robust Malware Detection Using Monotonic Classification., , , и . IWSPA@CODASPY, стр. 54-63. ACM, (2018)On the Robustness of Deep K-Nearest Neighbors., и . IEEE Symposium on Security and Privacy Workshops, стр. 1-7. IEEE, (2019)Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES., , и . CRYPTO, том 1109 из Lecture Notes in Computer Science, стр. 237-251. Springer, (1996)Truncated Differentials and Skipjack., , и . CRYPTO, том 1666 из Lecture Notes in Computer Science, стр. 165-180. Springer, (1999)A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags., , и . Selected Areas in Cryptography, том 3897 из Lecture Notes in Computer Science, стр. 276-290. Springer, (2005)Tweakable Block Ciphers., , и . CRYPTO, том 2442 из Lecture Notes in Computer Science, стр. 31-46. Springer, (2002)A Large-Scale Study of Modern Code Review and Security in Open Source Projects., и . PROMISE, стр. 83-92. ACM, (2017)Hopper: Modeling and Detecting Lateral Movement (Extended Report)., , , , , , и . CoRR, (2021)Defending Against Transfer Attacks From Public Models., , , , и . CoRR, (2023)