Author of the publication

MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities.

, , and . STM, volume 8203 of Lecture Notes in Computer Science, page 65-81. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending Security-by-Contract with Quantitative Trust on Mobile Devices., , , , , and . CISIS, page 872-877. IEEE Computer Society, (2010)RESIP Host Detection: Identification of Malicious Residential IP Proxy Flows., , , and . ICCE, page 1-6. IEEE, (2021)SHAKE: SHared Acceleration Key Establishment for Resource-Constrained IoT Devices., , , , and . WF-IoT, page 1-6. IEEE, (2020)Size Matters: Microservices Research and Applications., , , and . CoRR, (2019)A Formal Semantics for the WS-BPEL Recovery Framework - The pi-Calculus Way., and . WS-FM, volume 6194 of Lecture Notes in Computer Science, page 92-109. Springer, (2009)Protecting the Internet of Things with Security-by-Contract and Fog Computing., , and . WF-IoT, page 1-6. IEEE, (2019)Community Targeted Spam: A Middle Ground Between General Spam and Spear Phishing., and . CoRR, (2017)AntibIoTic: Protecting IoT Devices Against DDoS Attacks., , , and . CoRR, (2017)Fault tolerant knowledge level inter-agent communication in open multi-agent systems.. University of Bologna, Italy, (2006)ERAMO: Effective Remote Attestation through Memory Offloading., , and . CSR, page 73-80. IEEE, (2021)
OSZAR »