From post

Why eve and mallory love android: an analysis of android SSL (in)security

, , , , , и . Proceedings of the 2012 ACM conference on Computer and communications security, стр. 50--61. New York, NY, USA, ACM, (2012)
DOI: 10.1145/2382196.2382205

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Medical Case-Driven Classification of Microblogs: Characteristics and Annotation, , , и . Proc. of ACM SIGHIT International Health Informatics Symposium (IHI 2012), Miami, Florida, USA, January 28-30, 2012, (2011)Fast Confidential Search for Bio-Medical Data Using Bloom Filters and Homomorphic Cryptography, , , и . 2012 IEEE Eighth International Conference on eScience, 2012 IEEE Eighth International Conference on eScience, Los Alamitos, CA, USA, IEEE Computer Society, IEEE Computer Society, (2012)An Implementation of the Fully Homomorphic Smart-Vercauteren Crypto-System, , и . Proc. of the 18th ACM Conference on Computer and Communications Security (ACM CCS 2011), ACM, (2011)Using Personal Examples to Improve Risk Communication for Security &\#38; Privacy Decisions, , , и . Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems, стр. 2647--2656. New York, NY, USA, ACM, (2014)Towards a Mobile Security & Privacy Simulator, , и . Proceedings of 2011 IEEE Conference on Open Systems, стр. 95 - 100. (сентября 2011)To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections, , , , и . 24th USENIX Security Symposium (USENIX Security 15), стр. 239--254. Washington, D.C., USENIX Association, (августа 2015)Coupled multi-agent simulations for mobile security & privacy research., , и . DEST, стр. 1-6. IEEE, (2012)Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies, , , , , и . Proceedings of the 2019 Workshop on Usable Security (USEC), USEC 2019, (февраля 2019)Pursuing the peak of excellence: Wiki as a knowledge base., и . SIGUCCS, стр. 167-172. ACM, (2008)Why eve and mallory love android: an analysis of android SSL (in)security, , , , , и . Proceedings of the 2012 ACM conference on Computer and communications security, стр. 50--61. New York, NY, USA, ACM, (2012)