From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts., , и . RAID, стр. 115-128. ACM, (2022)Analysing Privacy Analyses., , и . ITASEC, том 1816 из CEUR Workshop Proceedings, стр. 19-28. CEUR-WS.org, (2017)Reverse Bayesian Poisoning: How to Use Spam Filters to Manipulate Online Elections., , и . E-VOTE-ID, том 10615 из Lecture Notes in Computer Science, стр. 183-197. Springer, (2017)ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks., , , , , и . AsiaCCS, стр. 584-597. ACM, (2020)Random Block Verification: Improving the Norwegian Electoral Mix-Net., , и . Electronic Voting, том P-205 из LNI, стр. 65-78. GI, (2012)File Fragmentation in the Wild: a Privacy-Friendly Approach., , , , , и . WIFS, стр. 1-6. IEEE, (2019)ÆGIS: Smart Shielding of Smart Contracts., , , и . CCS, стр. 2589-2591. ACM, (2019)A Security Perspective on Publication Metrics (Transcript of Discussion).. Security Protocols Workshop, том 10476 из Lecture Notes in Computer Science, стр. 201-213. Springer, (2017)Anonymity in Voting Revisited., и . Towards Trustworthy Elections, том 6000 из Lecture Notes in Computer Science, стр. 216-230. Springer, (2010)Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't (Transcript of Discussion).. Security Protocols Workshop, том 10368 из Lecture Notes in Computer Science, стр. 26-34. Springer, (2016)