Author of the publication

Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages.

, , , , , , , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 285-314. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Mavroudis, Vasilios
add a person with the name Mavroudis, Vasilios
 

Other publications of authors with the same name

Eavesdropping Whilst You're Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces., and . CoRR, (2018)Towards Low-level Cryptographic Primitives for JavaCards., and . CoRR, (2018)Market Manipulation as a Security Problem: Attacks and Defenses.. EuroSec@EuroSys, page 1:1-1:6. ACM, (2019)On the Privacy and Security of the Ultrasound Ecosystem., , , , , and . PoPETs, 2017 (2): 95-112 (2017)VAMS: Verifiable Auditing of Access to Confidential Data., , , , and . CoRR, (2018)An Interface Between Legacy and Modern Mobile Devices for Digital Identity., , and . ETAA, volume 13136 of Lecture Notes in Computer Science, page 68-76. Springer, (2021)Visual Analytics for Enhancing Supervised Attack Attribution in Mobile Networks., , , and . ISCIS, page 193-203. Springer, (2014)Market Manipulation as a Security Problem.. CoRR, (2019)A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components., , , , , and . ACM Conference on Computer and Communications Security, page 1583-1600. ACM, (2017)Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages., , , , , , , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 285-314. Springer, (2019)