From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television., и . USENIX Security Symposium, стр. 353-368. USENIX Association, (2014)Attacks on RFID-Based Electronic Voting Systems., и . IACR Cryptology ePrint Archive, (2009)Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model., , , и . CHES, том 7428 из Lecture Notes in Computer Science, стр. 140-154. Springer, (2012)A Secure Supply-Chain RFID System that Respects Your Privacy., , и . IEEE Pervasive Computing, 13 (2): 52-60 (2014)Attacking the Internet Using Broadcast Digital Television., и . ACM Trans. Inf. Syst. Secur., 17 (4): 16:1-16:27 (2015)Range Extension Attacks on Contactless Smart Cards., , и . ESORICS, том 8134 из Lecture Notes in Computer Science, стр. 646-663. Springer, (2013)Side-channel cryptographic attacks using pseudo-boolean optimization., и . Constraints An Int. J., 21 (4): 616-645 (2016)Remote Password Extraction from RFID Tags., и . IEEE Trans. Computers, 56 (9): 1292-1296 (2007)The Spy in the Sandbox - Practical Cache Attacks in Javascript., , , и . CoRR, (2015)A low-resource public-key identification scheme for RFID tags and sensor nodes., и . WISEC, стр. 59-68. ACM, (2009)