Personensuche
X
?
Proceedings of the 25th International Conference on World Wide Web ,
1
Remedying Web Hijacking : Notification Effectiveness and..:
, In:
?
Proceedings of the 2012 ACM conference on Computer and communications security ,
2
Manufacturing compromise : the emergence of exploit-as-a..:
, In:
?
Proceedings of the 15th ACM conference on Computer and communications security ,
5
Towards practical biometric key generation with randomized ..:
, In:
?
Proceedings of the 38th annual Symposium on Simulation ,
6