From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attestation-based policy enforcement for remote access., , , и . CCS, стр. 308-317. ACM, (2004)Linking remote attestation to secure tunnel endpoints., , и . STC, стр. 21-24. ACM, (2006)Managing the risk of covert information flows in virtual machine systems., , и . SACMAT, стр. 81-90. ACM, (2007)Reconciling malware labeling discrepancy via consensus learning., , , и . ICDE Workshops, стр. 84-89. IEEE Computer Society, (2014)Shame on Trust in Distributed Systems., , , , и . HotSec, USENIX Association, (2006)Toward Automated Information-Flow Integrity Verification for Security-Critical Applications., , и . NDSS, The Internet Society, (2006)Stream computing for large-scale, multi-channel cyber threat analytics., , , , , , , , и . IRI, стр. 8-15. IEEE Computer Society, (2014)Security Services in an Open Service Environment.. ACSAC, стр. 223-234. IEEE Computer Society, (1998)Pervasive Authentication Domains for Automatic Pervasive Device Authorization., и . PerCom Workshops, стр. 144-148. IEEE Computer Society, (2004)Verteiltes Filtern mit Contags und Sicherheits-Labeln., и . Kommunikation in Verteilten Systemen, стр. 93-102. Springer, (2001)