From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Smartphone Security: New Applications and Challenges.. ETH Zurich, Zürich, Switzerland, (2016)base-search.net (ftethz:oai:www.research-collection.ethz.ch:20.500.11850/155494).An architecture for concurrent execution of secure environments in clouds., , и . CCSW, стр. 11-22. ACM, (2013)Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound., , , и . USENIX Security Symposium, стр. 483-498. USENIX Association, (2015)Smartphones as Practical and Secure Location Verification Tokens for Payments., , , , и . NDSS, The Internet Society, (2014)User-level secure deletion on log-structured file systems., , , и . AsiaCCS, стр. 63-64. ACM, (2012)Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking., , , , и . SPSM@CCS, стр. 83-92. ACM, (2016)Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications., , , , и . CHI, стр. 540-551. ACM, (2016)Secure Deletion on Log-structured File Systems, , , и . CoRR, (2011)Secure enrollment and practical migration for mobile trusted execution environments., , , , и . SPSM@CCS, стр. 93-98. ACM, (2013)Logical Partitions on Many-Core Platforms., , , , и . ACSAC, стр. 451-460. ACM, (2015)