Showing 1 - 4 results of 4 for search 'A. V. Zuykov', query time: 0.02s
Refine Results
-
1
Attacks on Mobile Phones that Use the Vulnerability of NFC Technology by A. V. Starikovskiy, A. V. Zuykov, M. S. Aristov, D. A. Stepanyan
Published 2012-09-01
Article -
2
Wiretap of Mobile Subscribers’ Data by A. V. Zuykov, D. M. Mikhailov, A. V. Starikovskiy, M. I. Froimson
Published 2012-09-01
Article -
3
Vulnerabilities of GSM and Wiretapping by A. V. Novitskiy, D. M. Mikhailov, A. V. Starikovskiy, A. V. Zuykov
Published 2012-09-01
Article -
4
Vulnerabilities of Software for Mobile Phones and Secure Programming Techniques by T. R. Khabibullin, A. G. Beltov, I. Y. Zhukov, A. V. Zuykov, A. S. Smirnov
Published 2012-09-01
Article