From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical operation extraction from electromagnetic leakage for side-channel analysis and reverse engineering., , , , , и . WISEC, стр. 161-172. ACM, (2020)The Privacy API: Facilitating Insights in How One's Own User Data is Shared., , и . EuroS&P Workshops, стр. 72-75. IEEE, (2017)synchronous MediaSharing: social and communal media consumption for geographically dispersed users., , , и . MMSys, стр. 107-112. ACM, (2012)Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles., , , и . WISEC, стр. 189-194. ACM, (2014)PHY-layer security is no alternative to cryptography., , и . WISEC, стр. 160-162. ACM, (2017)Distributed Affine-Invariant MCMC Sampler., , , и . CLUSTER, стр. 520-524. IEEE Computer Society, (2017)TweetPos: A Tool to Study the Geographic Evolution of Twitter Topics., , , и . WEBIST (1), стр. 257-266. SciTePress, (2014)An overlay network providing application-aware multimedia services., , , и . AAA-IDEA, стр. 7. ACM, (2006)Investigating the relationship between QoS and QoE in a mixed desktop/handheld gaming setting., , , и . StudentWorkshop@CoNEXT, стр. 29-30. ACM, (2009)Investigating the Influence of Communication and Input Devices on Collaboration in Virtual Environments., , , , и . GRAPP, стр. 341-346. INSTICC Press, (2010)