From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST., , , , , и . EVT, USENIX Association, (2008)Accountable Wiretapping -or- I know they can hear you now., , , , , и . NDSS, The Internet Society, (2012)Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs., , и . TaPP, USENIX Association, (2015)Examining DES-based Cipher Suite Support within the TLS Ecosystem., , , , , и . AsiaCCS, стр. 539-546. ACM, (2019)Kells: a protection framework for portable data., , и . ACSAC, стр. 231-240. ACM, (2010)Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways., , , , , и . IEEE Symposium on Security and Privacy, стр. 339-356. IEEE Computer Society, (2016)Trustworthy Whole-System Provenance for the Linux Kernel., , , и . USENIX Security Symposium, стр. 319-334. USENIX Association, (2015)Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World., , , , и . USENIX Security Symposium, стр. 17-32. USENIX Association, (2015)Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses., , , , , и . SP, стр. 1857-1874. IEEE, (2023)For Your Eyes Only: Privacy-preserving eye-tracking datasets., , и . ETRA, стр. 10:1-10:6. ACM, (2022)