From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal.. CANS, том 14342 из Lecture Notes in Computer Science, стр. 251-267. Springer, (2023)Authentication Key Recovery on Galois/Counter Mode (GCM)., и . AFRICACRYPT, том 9646 из Lecture Notes in Computer Science, стр. 127-143. Springer, (2016)Evaluation of VoIP media security for smartphones in the context of IMS., , и . Swe-CTW, стр. 123-128. IEEE, (2011)Nori: Concealing the Concealed Identifier in 5G., и . ARES, стр. 105:1-105:7. ACM, (2021)