From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Hybrid Scheme for Authenticating Scalable Video Codestreams., , , и . IEEE Trans. Inf. Forensics Secur., 9 (4): 543-553 (2014)Coercion resistance in authentication responsibility shifting., , и . AsiaCCS, стр. 97-98. ACM, (2012)On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms., и . EuroS&P, стр. 546-560. IEEE, (2017)Hardware-Assisted Fine-Grained Code-Reuse Attack Detection., , и . RAID, том 9404 из Lecture Notes in Computer Science, стр. 66-85. Springer, (2015)Technique for authenticating H.264/SVC streams in surveillance applications., , , , , и . ICME Workshops, стр. 1-4. IEEE Computer Society, (2013)A Method for Fast Revocation of Public Key Certificates and Security Capabilities., , , и . USENIX Security Symposium, USENIX, (2001)A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces., и . SP, стр. 1902-1918. IEEE, (2021)FastKLEE: faster symbolic execution via reducing redundant bound checking of type-safe pointers., , , и . ESEC/SIGSOFT FSE, стр. 1741-1745. ACM, (2022)T-Counter: Trustworthy and Efficient CPU Resource Measurement Using SGX in the Cloud., , , , , , и . IEEE Trans. Dependable Secur. Comput., 20 (1): 867-885 (2023)On the Root of Trust Identification Problem., , и . IPSN, стр. 315-327. ACM, (2021)