Search for persons
X
?
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
1
Authenticating Mobile Users to Public Internet Commodity Se..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
3
On Adoptability and Use Case Exploration of Threat Modeling..:
, In:
?
Secure IT Systems; Lecture Notes in Computer Science ,
4
Adversarial Trends in Mobile Communication Systems: From At..:
, In:
?
Proceedings of the 12th European Workshop on Systems Security ,
5
Pitfalls of open architecture : How friends can exploit ..:
, In:
?
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications ,
6