From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy management for portable recording devices., , и . WPES, стр. 16-24. ACM, (2004)Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration Tools., , , и . Financial Cryptography, том 7035 из Lecture Notes in Computer Science, стр. 77-84. Springer, (2011)Investigating Large Scale HTTPS Interception in Kazakhstan., , , , и . Internet Measurement Conference, стр. 125-132. ACM, (2020)OpenVPN is Open to VPN Fingerprinting., , , , , , и . CoRR, (2024)The Matter of Heartbleed., , , , , , , , , и 1 other автор(ы). Internet Measurement Conference, стр. 475-488. ACM, (2014)A Search Engine Backed by Internet-Wide Scanning., , , , и . CCS, стр. 542-553. ACM, (2015)Digital Rights Management, Spyware, and Security., и . IEEE Secur. Priv., 4 (1): 18-23 (2006)Elliptic Curve Cryptography in Practice., , , , , и . Financial Cryptography, том 8437 из Lecture Notes in Computer Science, стр. 157-175. Springer, (2014)Lessons from the Sony CD DRM Episode., и . USENIX Security Symposium, USENIX Association, (2006)Quack: Scalable Remote Measurement of Application-Layer Censorship., , , , и . USENIX Security Symposium, стр. 187-202. USENIX Association, (2018)