From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analyzing Security and Privacy in Design and Implementation of Web Authentication Protocols.. ICFEM, том 11232 из Lecture Notes in Computer Science, стр. 441-445. Springer, (2018)A lightweight middleware framework for vehicle networking application., , , и . Concurr. Comput. Pract. Exp., 27 (17): 4914-4937 (2015)Beyond Fidelity: Explaining Vulnerability Localization of Learning-based Detectors., , , , , , , , и . CoRR, (2024)A Framework for Formal Analysis of Privacy on SSO Protocols., , , и . SecureComm, том 238 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 763-777. Springer, (2017)It's Not Just the Site, It's the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts., , , , и . WWW, стр. 2142-2153. ACM / IW3C2, (2021)Assessing certificate validation user interfaces of WPA supplicants., , , , , , и . MobiCom, стр. 501-513. ACM, (2022)HOMESCAN: Scrutinizing Implementations of Smart Home Integrations., , , , , и . ICECCS, стр. 21-30. IEEE Computer Society, (2018)On the Usage-scenario-based Data Minimization in Mini Programs., , , и . SaTS@CCS, стр. 29-32. ACM, (2023)Cloud Computing-Assisted Dose Verification System and Method for Tumor Pain Treatment., , , , , , , , , и 5 other автор(ы). IEEE Access, (2020)The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors., , , , , , , , и . CoRR, (2024)