From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Seamless and Secure Bluetooth LE Connection Migration., , , и . CODASPY, стр. 147-149. ACM, (2017)5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol., , , , и . ACM Conference on Computer and Communications Security, стр. 669-684. ACM, (2019)Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices., , , и . IEEE Trans. Mob. Comput., 17 (4): 927-944 (2018)Insecure connection bootstrapping in cellular networks: the root of all evil., , , , и . WiSec, стр. 1-11. ACM, (2019)SAAMAN: Scalable Address Autoconfiguration in Mobile Ad Hoc Networks., , и . J. Netw. Syst. Manag., 19 (3): 394-426 (2011)Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices., , , , , , , и . CoRR, (2022)Securing the Insecure Link of Internet-of-Things Using Next-Generation Smart Gateways., , и . DCOSS, стр. 66-73. IEEE, (2019)Building a Privacy-Preserving Smart Camera System., , , , , , , и . CoRR, (2022)Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications., , , , , , , , , и 1 other автор(ы). CoRR, (2023)Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations., , , , и . AsiaCCS, стр. 501-515. ACM, (2021)