From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CheriRTOS: A Capability Model for Embedded Devices., , , , , , , , , и 6 other автор(ы). ICCD, стр. 92-99. IEEE Computer Society, (2018)Architectural Contracts for Safe Speculation., , , , , , , , , и 3 other автор(ы). ICCD, стр. 578-586. IEEE, (2023)Cornucopia: Temporal Safety for CHERI Heaps., , , , , , , , , и 14 other автор(ы). SP, стр. 608-625. IEEE, (2020)Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process., , , , , , , , , и 3 other автор(ы). SP, стр. 1003-1020. IEEE, (2020)CHERI JNI: Sinking the Java Security Model into the C., , , , , , , , , и 5 other автор(ы). ASPLOS, стр. 569-583. ACM, (2017)CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment., , , , , , , , , и 11 other автор(ы). ASPLOS, стр. 379-393. ACM, (2019)High-performance memory safety: optimizing the CHERI capability machine.. University of Cambridge, UK, (2018)British Library, EThOS.