From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Nithyanand, Rishab
add a person with the name Nithyanand, Rishab
 

Другие публикации лиц с тем же именем

The password allocation problem: strategies for reusing passwords effectively., и . WPES, стр. 255-260. ACM, (2013)The Morbid Realities of Social Media: An Investigation into the Narratives Shared by the Deceased Victims of COVID-19., и . ICWSM, стр. 303-314. AAAI Press, (2023)Extortion or Expansion? An Investigation into the Costs and Consequences of ICANN's gTLD Experiments., , , , и . PAM, том 12048 из Lecture Notes in Computer Science, стр. 141-157. Springer, (2020)Due to the global outbreak of COVID-19, the PAM 2020 conference was organized as a virtual meeting..Poster: making the case for intrinsic personal physical unclonable functions (IP-PUFs)., , и . ACM Conference on Computer and Communications Security, стр. 825-828. ACM, (2011)Groupthink: usability of secure group association for wireless devices., , , и . UbiComp, стр. 331-340. ACM, (2010)Exploring the Design Space of Longitudinal Censorship Measurement Platforms, , , , , , и . (2016)Games without Frontiers: Investigating Video Games as a Covert Channel., , , и . EuroS&P, стр. 63-77. IEEE, (2016)A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem., и . IEEE Symposium on Security and Privacy Workshops, стр. 1-11. IEEE Computer Society, (2012)The Morbid Realities of Social Media: An Investigation into the Misinformation Shared by the Deceased Victims of COVID-19., и . CoRR, (2022)Measuring Offensive Speech in Online Political Discourse., , и . FOCI @ USENIX Security Symposium, USENIX Association, (2017)