From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning., , , , , , и . WISEC, стр. 1-11. ACM, (2018)Detection and Analysis of Cryptographic Data Inside Software., , , и . ISC, том 7001 из Lecture Notes in Computer Science, стр. 182-196. Springer, (2011)A New Differential Fault Attack on SPN Structure, with Application to AES Cipher., , , , , и . J. Comput., 6 (2): 216-223 (2011)Differential fault analysis on Camellia., , , , и . J. Syst. Softw., 83 (5): 844-851 (2010)An Empirical Study of SDK Credential Misuse in iOS Apps., , , и . APSEC, стр. 258-267. IEEE, (2018)PEDroid: Automatically Extracting Patches from Android App Updates., , , , и . ECOOP, том 222 из LIPIcs, стр. 21:1-21:31. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services., , , , , и . ACSAC, стр. 320-331. ACM, (2020)Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps., , , , , , и . ICSE, стр. 1671-1682. IEEE, (2021)Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK., , , , , , , , и . SP, стр. 650-665. IEEE, (2022)Yet Another Traffic Black Hole: Amplifying CDN Fetching Traffic with RangeFragAmp Attacks., , и . CollaborateCom (1), том 406 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 439-459. Springer, (2021)