Personensuche
X
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
1
Tamarin-Based Analysis of Bluetooth Uncovers Two Practical ..:
, In:
?
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security ,
2
Stairway To Rainbow:
, In:
?
Computer Security – ESORICS 2021; Lecture Notes in Computer Science ,
5
Precomputation for Rainbow Tables has Never Been so Fast:
, In:
?
Security of Ubiquitous Computing Systems ,
6
From Relay Attacks to Distance-Bounding Protocols:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
7
How Distance-Bounding Can Detect Internet Traffic Hijacking:
, In:
?
Topics in Cryptology – CT-RSA 2020; Lecture Notes in Computer Science ,
8
Symmetric-Key Authenticated Key Exchange (SAKE) with Perfec..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
11
Morellian Analysis for Browsers: Making Web Authentication ..:
, In:
?
Lecture Notes in Computer Science; Computer Security – ESORICS 2019 ,
12