From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense., , и . USENIX Security Symposium, стр. 187-198. USENIX Association, (2009)Forcehttps: protecting high-security web sites from network attacks., и . WWW, стр. 525-534. ACM, (2008)A Learning-Based Approach to Reactive Security., , , , , и . IEEE Trans. Dependable Secur. Comput., 9 (4): 482-493 (2012)Design and analysis of privacy policies.. Stanford University, USA, (2008)App isolation: get the security of multiple browsers with just one., , , , и . ACM Conference on Computer and Communications Security, стр. 227-238. ACM, (2011)The Security Architecture of the Chro-mium Browser, , , и . (2008)Privacy in Encrypted Content Distribution Using Private Broadcast Encryption., , и . Financial Cryptography, том 4107 из Lecture Notes in Computer Science, стр. 52-64. Springer, (2006)Privacy and Contextual Integrity: Framework and Applications., , , и . S&P, стр. 184-198. IEEE Computer Society, (2006)Securing frame communication in browsers., , и . Commun. ACM, 52 (6): 83-91 (2009)Conflict and combination in privacy policy languages., , и . WPES, стр. 45-46. ACM, (2004)