From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Protocol for Privately Reporting Ad Impressions at Scale., , и . ACM Conference on Computer and Communications Security, стр. 1591-1601. ACM, (2016)Don't Talk to Strangers - On the Challenges of Intelligent Vehicle Authentication., и . VEHITS, стр. 522-528. SciTePress, (2018)Efficient Proofs of Software Exploitability for Real-world Processors., , , , , и . Proc. Priv. Enhancing Technol., 2023 (1): 627-640 (января 2023)Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage., , , , и . USENIX Security Symposium, стр. 655-672. USENIX Association, (2016)Keys under doormats: mandating insecurity by requiring government access to all data and communications., , , , , , , , , и 5 other автор(ы). J. Cybersecur., 1 (1): 69-79 (2015)Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers., , и . NDSS, The Internet Society, (2019)Charm: A Framework for Rapidly Prototyping Cryptosystems., , и . NDSS, The Internet Society, (2012)Fluid MPC: Secure Multiparty Computation with Dynamic Participants., , , , и . CRYPTO (2), том 12826 из Lecture Notes in Computer Science, стр. 94-123. Springer, (2021)Blogging birds: Generating narratives about reintroduced species to promote public engagement., , , , и . INLG, стр. 120-124. The Association for Computer Linguistics, (2012)Downgrade Resilience in Key-Exchange Protocols., , , , , и . IEEE Symposium on Security and Privacy, стр. 506-525. IEEE Computer Society, (2016)