From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multiplicative Differentials., , , и . FSE, том 2365 из Lecture Notes in Computer Science, стр. 17-33. Springer, (2002)Safety in discretionary access control for logic-based publish-subscribe systems., , и . SACMAT, стр. 3-12. ACM, (2009)FlyByNight: mitigating the privacy risks of social networking., и . WPES, стр. 1-8. ACM, (2008)Cachet: a decentralized architecture for privacy preserving social networking with caching., , , , и . CoNEXT, стр. 337-348. ACM, (2012)Securing Anonymous Communication Channels under the Selective DoS Attack., и . Financial Cryptography, том 7859 из Lecture Notes in Computer Science, стр. 362-370. Springer, (2013)Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses., , и . NDSS, The Internet Society, (2016)Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild., , , , , , , , и . WWW, стр. 840-852. ACM, (2019)Fingerprinting websites using remote traffic analysis., , и . CCS, стр. 684-686. ACM, (2010)Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks., , , , и . ICC, стр. 1-5. IEEE, (2010)Off-the-record communication, or, why not to use PGP., , и . WPES, стр. 77-84. ACM, (2004)