From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Effects of charge-based computation non-idealities on CMOS image compression sensors., , , , и . ISCAS, IEEE, (2006)A CMOS Front-End for a Lossy Image Compression Sensor., , , , и . ISCAS, стр. 2838-2841. IEEE, (2007)Thwarting Smartphone SMS Attacks at the Radio Interface Layer., , , и . NDSS, The Internet Society, (2023)Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing., , и . NDSS, The Internet Society, (2023)You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps., , , , , и . USENIX Security Symposium, стр. 657-690. USENIX Association, (2015)Towards Formal Verification of State Continuity for Enclave Programs., , , и . USENIX Security Symposium, стр. 573-590. USENIX Association, (2021)Automatic Policy Generation for Inter-Service Access Control of Microservices., , , , и . USENIX Security Symposium, стр. 3971-3988. USENIX Association, (2021)Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks., , , , , и . USENIX Security Symposium, стр. 37-54. USENIX Association, (2020)One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat., , и . USENIX Security Symposium, стр. 6629-6646. USENIX Association, (2023)AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services., , и . CCS, стр. 799-813. ACM, (2017)