From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Internet background radiation revisited., , , , и . Internet Measurement Conference, стр. 62-74. ACM, (2010)ExSpectre: Hiding Malware in Speculative Execution., , и . NDSS, The Internet Society, (2019)Security analysis of India's electronic voting machines., , , , , , , и . ACM Conference on Computer and Communications Security, стр. 1-14. ACM, (2010)Initial measurements of the cuban street network., , , и . Internet Measurement Conference, стр. 318-324. ACM, (2017)Attacking the Washington, D.C. Internet Voting System., , , и . Financial Cryptography, том 7397 из Lecture Notes in Computer Science, стр. 114-128. Springer, (2012)Proof of Censorship: Enabling Centralized Censorship-Resistant Content Providers., , и . Financial Cryptography, том 10957 из Lecture Notes in Computer Science, стр. 99-115. Springer, (2018)Investigating Large Scale HTTPS Interception in Kazakhstan., , , , и . Internet Measurement Conference, стр. 125-132. ACM, (2020)Elliptic Curve Cryptography in Practice., , , , , и . Financial Cryptography, том 8437 из Lecture Notes in Computer Science, стр. 157-175. Springer, (2014)Weaponizing Middleboxes for TCP Reflected Amplification., , , , , и . USENIX Security Symposium, стр. 3345-3361. USENIX Association, (2021)The use of TLS in Censorship Circumvention., и . NDSS, The Internet Society, (2019)