From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Accelerated MPEG compression of dynamic polygonal scenes., , и . SIGGRAPH, стр. 193-196. ACM, (1994)Sub-linear Privacy-preserving Search with Untrusted Server and Semi-honest Parties., , , , и . CoRR, (2016)The Case for Networked Remote Voting Precincts., и . EVT, USENIX Association, (2008)A case of collusion: a study of the interface between ad libraries and their apps., и . SPSM@CCS, стр. 79-86. ACM, (2013)Picking up the trash: Exploiting generational GC for memory analysis., , и . Digit. Investig., (2017)Known Unknowns: An Analysis of Twitter Censorship in Turkey., , , , и . WPES@CCS, стр. 11-20. ACM, (2015)Secure Routing for Structured Peer-to-Peer Overlay Networks., , , , и . OSDI, USENIX Association, (2002)Operating Systems Review 36, Special Issue, Winter 2002.Run-Time Support for Distributed Sharing in Typed Languages., , , , и . LCR, том 1915 из Lecture Notes in Computer Science, стр. 192-206. Springer, (2000)The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities., , , , и . IEEE Trans. Mob. Comput., 14 (11): 2376-2391 (2015)Web Spoofing: An Internet Con Game, , , и . Proceedings of the 20th National Information Systems Security, Baltimore, Maryland, (октября 1997)