From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries., , , , , и . EuroS&P, стр. 350-365. IEEE, (2017)A delegated authorization solution for smart-city mobile applications., , и . RTSI, стр. 1-6. IEEE, (2016)LTL model-checking for security protocols.. AI Commun., 24 (3): 281-283 (2011)An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations., , , , , и . Comput. Secur., (2013)Cross-Domain Sharing of User Claims: A Design Proposal for OpenID Connect Attribute Authorities., , , , , и . ARES, стр. 20:1-20:11. ACM, (2023)Android Permissions Unleashed., , , и . CSF, стр. 320-333. IEEE Computer Society, (2015)Blockchain Based RAN Data Sharing., , , , , , , , и . SMDS, стр. 152-161. IEEE, (2021)Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud., , , и . ACM Trans. Priv. Secur., 25 (1): 2:1-2:37 (2022)LTL model checking for security protocols., , и . J. Appl. Non Class. Logics, 19 (4): 403-429 (2009)Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution., , , и . SECRYPT, стр. 147-158. SciTePress, (2016)