From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MaxPace: Speed-constrained location queries., , и . CNS, стр. 136-144. IEEE, (2016)Hardening the security analysis of browser extensions., , и . SAC, стр. 1694-1703. ACM, (2022)Data Exfiltration in the Face of CSP., , и . AsiaCCS, стр. 853-864. ACM, (2016)Polyglots: crossing origins by crossing formats., , и . ACM Conference on Computer and Communications Security, стр. 753-764. ACM, (2013)Data Privacy in Trigger-Action IoT Systems., , , , , и . CoRR, (2020)PrivatePool: Privacy-Preserving Ridesharing., , и . CSF, стр. 276-291. IEEE Computer Society, (2017)Tracking Information Flow via Delayed Output - Addressing Privacy in IoT and Emailing Apps., , и . NordSec, том 11252 из Lecture Notes in Computer Science, стр. 19-37. Springer, (2018)LazyTAP: On-Demand Data Minimization for Trigger-Action Applications., , и . SP, стр. 3079-3097. IEEE, (2023)Securing Node-RED Applications., , , , и . Protocols, Strands, and Logic, том 13066 из Lecture Notes in Computer Science, стр. 1-21. Springer, (2021)Nontransitive Policies Transpiled., , и . EuroS&P, стр. 543-561. IEEE, (2021)