From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Spectre Attacks: Exploiting Speculative Execution., , , , , , , , , и 2 other автор(ы). IEEE Symposium on Security and Privacy, стр. 1-19. IEEE, (2019)Mit Self-Monitoring die Kompetenzentwicklung in die eigene Hand nehmen., и . DeLFI Workshops, TUDpress, (2011)Meltdown., , , , , , , , , и . CoRR, (2018)ZombieLoad: Cross-Privilege-Boundary Data Sampling., , , , , , и . CCS, стр. 753-768. ACM, (2019)Meltdown: reading kernel memory from user space., , , , , , , , , и 2 other автор(ы). Commun. ACM, 63 (6): 46-56 (2020)Meltdown: Reading Kernel Memory from User Space., , , , , , , , , и 2 other автор(ы). USENIX Security Symposium, стр. 973-990. USENIX Association, (2018)Digitalisierung im Handwerk als Lernprozess fördern., , , , , и . DeLFI Workshops, том 1669 из CEUR Workshop Proceedings, стр. 209-215. CEUR-WS.org, (2016)LazyFP: Leaking FPU Register State using Microarchitectural Side-Channels., и . CoRR, (2018)Spectre attacks: exploiting speculative execution., , , , , , , , , и 2 other автор(ы). Commun. ACM, 63 (7): 93-101 (2020)Spectre Attacks: Exploiting Speculative Execution., , , , , , , , , и . CoRR, (2018)