From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Formal Modelling and Verification of Spinlocks at Instruction Level., , , , , и . APSEC, стр. 355-362. IEEE, (2019)Formalizing the Transaction Flow Process of Hyperledger Fabric., , , , и . ICFEM, том 12531 из Lecture Notes in Computer Science, стр. 233-250. Springer, (2020)Reasoning About Iteration and Recursion Uniformly Based on Big-Step Semantics., , , , и . SETTA, том 13071 из Lecture Notes in Computer Science, стр. 61-80. Springer, (2021)Design and Implementation of OOM Module based on Rust., , , , и . QRS Companion, стр. 774-775. IEEE, (2022)Formal Verification of Interrupt Isolation for the TrustZone-based TEE., , , , , , и . APSEC, стр. 309-318. IEEE, (2023)Urban Disaster Comprehensive Risk Assessment Research Based on GIS: A Case Study of Changsha City, Hunan Province, China., , , и . GRMSE, том 569 из Communications in Computer and Information Science, стр. 95-106. Springer, (2015)sHMQV: An Efficient Key Exchange Protocol for Power-Limited Devices., и . ISPEC, том 9065 из Lecture Notes in Computer Science, стр. 154-167. Springer, (2015)Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices., , , , и . ICICS, том 8958 из Lecture Notes in Computer Science, стр. 31-48. Springer, (2014)函数矩阵及其微积分的高阶逻辑形式化 (Higher-order Logic Formalization of Function Matrix and its Calculus)., , , , , и . 计算机科学, 43 (11): 24-29 (2016)A Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0., и . TRUST, том 9229 из Lecture Notes in Computer Science, стр. 40-57. Springer, (2015)