From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Lest We Remember: Cold Boot Attacks on Encryption Keys., , , , , , , , и . USENIX Security Symposium, стр. 45-60. USENIX Association, (2008)Lest we remember: cold-boot attacks on encryption keys., , , , , , , , и . Commun. ACM, 52 (5): 91-98 (2009)Private Resource Pairing., и . Privacy Enhancing Technologies, том 4258 из Lecture Notes in Computer Science, стр. 258-276. Springer, (2006)Bubble Trouble: Off-Line De-Anonymization of Bubble Forms., , и . USENIX Security Symposium, USENIX Association, (2011)"You Might Also Like: " Privacy Risks of Collaborative Filtering., , , , и . IEEE Symposium on Security and Privacy, стр. 231-246. IEEE Computer Society, (2011)In Defense of Pseudorandom Sample Selection., , и . EVT, USENIX Association, (2008)Machine-Assisted Election Auditing.. EVT, USENIX Association, (2007)Some Consequences of Paper Fingerprinting for Elections., и . EVT/WOTE, USENIX Association, (2009)