From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Let numbers tell the tale: measuring security trends in wi-fi networks and best practices., , и . WISEC, стр. 100-105. ACM, (2021)Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections., , , и . USENIX Security Symposium, стр. 1985-2002. USENIX Association, (2020)Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks., , , , и . WISEC, стр. 34-39. ACM, (2018)Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives., и . WOOT @ USENIX Security Symposium, USENIX Association, (2018)The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning., , , , , и . CCS, стр. 2265-2278. ACM, (2022)Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing., , и . AsiaCCS, стр. 360-371. ACM, (2017)Advanced Wi-Fi attacks using commodity hardware., и . ACSAC, стр. 256-265. ACM, (2014)All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS., и . USENIX ATC, USENIX Association, (2016)Practical verification of WPA-TKIP vulnerabilities., и . AsiaCCS, стр. 427-436. ACM, (2013)Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2., и . CCS, стр. 1313-1328. ACM, (2017)