From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Comments on Twofish as an AES Candidate., , , , и . AES Candidate Conference, стр. 355-356. (2000)A Security Evaluation of Whitenoise.. IACR Cryptology ePrint Archive, (2003)Cryptanalysis of a Cognitive Authentication Scheme., и . IACR Cryptology ePrint Archive, (2006)Towards Efficient Second-Order Power Analysis., и . CHES, том 3156 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2004)Do Android users write about electric sheep? Examining consumer reviews in Google Play., и . CCNC, стр. 149-157. IEEE, (2013)Hidden Markov Model Cryptanalysis., и . CHES, том 2779 из Lecture Notes in Computer Science, стр. 17-34. Springer, (2003)Intercepting mobile communications: the insecurity of 802.11., , и . MobiCom, стр. 180-189. ACM, (2001)The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks., , , и . ICISC, том 3935 из Lecture Notes in Computer Science, стр. 156-168. Springer, (2005)Recovering High-Value Secrets with SGX and Social Authentication., , и . WAY@SOUPS, USENIX Association, (2016)An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography., , , , , , и . Information Hiding, том 3727 из Lecture Notes in Computer Science, стр. 327-341. Springer, (2005)