From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints., , , , и . CCS, стр. 2890-2905. ACM, (2021)In Hardware We Trust? From TPM to Enclave Computing on RISC-V., , , и . VLSI-SoC, стр. 1-6. IEEE, (2021)VirTEE: a full backward-compatible TEE with native live migration and secure I/O., , , , , , , и . DAC, стр. 241-246. ACM, (2022)Trusted Container Extensions for Container-based Confidential Computing., , , , и . CoRR, (2022)Sustainable Security & Safety: Challenges and Opportunities., , , , , , , , и . CERTS, том 73 из OASIcs, стр. 4:1-4:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)VoiceGuard: Secure and Private Speech Processing., , , , , и . INTERSPEECH, стр. 1303-1307. ISCA, (2018)GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks., , , , , и . RAID, стр. 220-234. ACM, (2021)TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V., , , , , и . NDSS, The Internet Society, (2019)SANCTUARY: ARMing TrustZone with User-space Enclaves., , , , и . NDSS, The Internet Society, (2019)CURE: A Security Architecture with CUstomizable and Resilient Enclaves., , , , , , и . CoRR, (2020)