Personensuche
X
?
Proceedings of the 35th Annual ACM Symposium on Applied Computing ,
4
HeadPrint : detecting anomalous communications through h..:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks ,
5
Victim-Aware Adaptive Covert Channels:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
6
Two-Client and Multi-client Functional Encryption for Set I..:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
9
Multi-client Predicate-Only Encryption for Conjunctive Equa..:
, In:
?
Proceedings of the 33rd Annual Computer Security Applications Conference ,
11