The following publications are possibly variants of this publication:
- All your jammers belong to us - Localization of wireless sensors under jamming attackYu Seung Kim, Frank Mokaya, Eric Chen, Patrick Tague. icc 2012: 949-954 [doi]
- All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing APIYuan Tian, Ying-Chuan Liu, Amar Bhosale, Lin-Shung Huang, Patrick Tague, Collin Jackson. sp 2014: 34-48 [doi]
- All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable EncryptionYupeng Zhang, Jonathan Katz, Charalampos Papamanthou. iacr, 2016:172, 2016. [doi]
- All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable EncryptionYupeng Zhang, Jonathan Katz, Charalampos Papamanthou. uss 2016: 707-720 [doi]