From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy., , , и . AsiaCCS, стр. 196-207. ACM, (2022)The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR., , и . USENIX Security Symposium, стр. 1047-1061. USENIX Association, (2019)E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem., , , , и . WISEC, стр. 85-95. ACM, (2023)Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3., , , , и . CPS-SPC@CCS, стр. 93-102. ACM, (2017)MiniCPS: A Toolkit for Security Research on CPS Networks., и . CPS-SPC@CCS, стр. 91-100. ACM, (2015)Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android., , и . NDSS, The Internet Society, (2019)Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot., , и . CoRR, (2018)BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses.. CCS, стр. 636-650. ACM, (2023)On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats., и . SP (Workshops), стр. 353-362. IEEE, (2022)On-chip lightweight implementation of reduced NIST randomness test suite., , и . HOST, стр. 93-98. IEEE Computer Society, (2013)