From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trusted Container Extensions for Container-based Confidential Computing., , , , и . CoRR, (2022)GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks., , , , , и . RAID, стр. 220-234. ACM, (2021)RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64., , , , , , , и . RAID, стр. 30-42. ACM, (2022)In Hardware We Trust: Gains and Pains of Hardware-assisted Security., , , , и . DAC, стр. 44. ACM, (2019)SafeTEE: Combining Safety and Security on ARM-based Microcontrollers., , , , и . DATE, стр. 520-525. IEEE, (2022)POSE: Practical Off-chain Smart Contract Execution., , , , , , и . CoRR, (2022)POSE: Practical Off-chain Smart Contract Execution., , , , , , и . NDSS, The Internet Society, (2023)FastKitten: Practical Smart Contracts on Bitcoin., , , , , , , и . USENIX Security Symposium, стр. 801-818. USENIX Association, (2019)DARWIN: Survival of the Fittest Fuzzing Mutators., , , , и . CoRR, (2022)NAUTILUS: Fishing for Deep Bugs with Grammars., , , , , и . NDSS, The Internet Society, (2019)