From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A study of mass-mailing worms., , , и . WORM, стр. 1-10. ACM Press, (2004)Device-Enabled Authorization in the Grey-System., , , , , и . ISC, том 3650 из Lecture Notes in Computer Science, стр. 431-445. Springer, (2005)OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms., , , , , и . ACM Conference on Computer and Communications Security, стр. 13-24. ACM, (2013)Bootstrapping Trust in Commodity Computers., , и . IEEE Symposium on Security and Privacy, стр. 414-429. IEEE Computer Society, (2010)Memoir: Practical State Continuity for Protected Modules., , , , и . IEEE Symposium on Security and Privacy, стр. 379-394. IEEE Computer Society, (2011)CLAMP: Practical Prevention of Large-Scale Data Leaks., , , , и . SP, стр. 154-169. IEEE Computer Society, (2009)Towards Sound Detection of Virtual Machines., , , , , и . Botnet Detection, том 36 из Advances in Information Security, Springer, (2008)Parametric Verification of Address Space Separation., , , , и . POST, том 7215 из Lecture Notes in Computer Science, стр. 51-68. Springer, (2012)Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture., , , , и . TRUST, том 6101 из Lecture Notes in Computer Science, стр. 141-165. Springer, (2010)VIPER: verifying the integrity of PERipherals' firmware., , и . ACM Conference on Computer and Communications Security, стр. 3-16. ACM, (2011)