From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Anatomy of Commercial IMSI Catchers and Detectors., , , и . Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2019)Hardware-software integrated approaches to defend against software cache-based side channel attacks., , , и . HPCA, стр. 393-404. IEEE Computer Society, (2009)On the Complexity of Computing Short Linearly Independent Vectors and Short Bases in a Lattice., и . STOC, стр. 711-720. ACM, (1999)pBMDS: a behavior-based malware detection system for cellphone devices., , , и . WISEC, стр. 37-48. ACM, (2010)Cheap Hardware Parallelism Implies Cheap Security., и . FDTC, стр. 80-91. IEEE Computer Society, (2007)Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms., , и . MobiSec, том 17 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 71-82. Springer, (2009)On the Implementation of the Advanced Encryption Standard on a Public-key Crypto-Coprocessor., и . CARDIS, стр. 135-146. USENIX, (2002)Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems., , , , и . NDSS, The Internet Society, (2016)Automotive MILS., и . GI-Jahrestagung, том P-246 из LNI, стр. 1647. GI, (2015)A Secure DVB Set-Top Box via Trusting Computing Technologies., , и . CCNC, стр. 1-8. IEEE, (2009)