From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Empirical Analysis on the Use and Reporting of National Security Letters., , , , и . CoRR, (2024)Reasoning Analytically about Password-Cracking Software., , , , и . IEEE Symposium on Security and Privacy, стр. 380-397. IEEE, (2019)NewsGuesser: Using Curiosity to Reduce Selective Exposure., , , , и . Proc. ACM Hum. Comput. Interact., 8 (CSCW1): 1-22 (2024)Limited Access: The Truth Behind Far Memory., , , , , , и . WORDS@SOSP, стр. 37-43. ACM, (2023)Bi-objective Optimization of Emergency Dispatching and Routing for Multi-mode Network Using Ant Colony Algorithm., и . ICITE, стр. 513-517. IEEE, (2020)Who's got your mail?: characterizing mail service provider usage., , , , , и . Internet Measurement Conference, стр. 122-136. ACM, (2021)Home is where the hijacking is: understanding DNS interception by residential routers., , , , , , и . Internet Measurement Conference, стр. 390-397. ACM, (2021)Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy., , , , , , и . EuroS&P, стр. 373-391. IEEE, (2023)A new three-dimensional memristor chaotic circuit design and its application in image encryption., , и . J. Supercomput., 80 (10): 14694-14724 (июля 2024)Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender., , , , , , и . SOUPS, стр. 77-95. USENIX Association, (2023)