From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Securing the drop-box architecture for assisted living., , , и . FMSE, стр. 1-12. ACM, (2006)Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems., , , и . ISPEC, том 3903 из Lecture Notes in Computer Science, стр. 235-247. Springer, (2006)Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code Pages., , , , и . USENIX Security Symposium, USENIX Association, (2024)A Small But Non-negligible Flaw in the Android Permission Scheme., , , , и . POLICY, стр. 107-110. IEEE Computer Society, (2010)How to Bootstrap Security for Ad-Hoc Network: Revisited., , , , и . SEC, том 297 из IFIP Advances in Information and Communication Technology, стр. 119-131. Springer, (2009)Extended Role Based Access Control and Procedural Restrictions., , , , и . ICISC, том 2971 из Lecture Notes in Computer Science, стр. 184-196. Springer, (2003)A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework., , , и . SocialCom/PASSAT, стр. 944-951. IEEE Computer Society, (2010)Enforcement of Integrated Security Policy in Trusted Operating Systems., , , и . IWSEC, том 4752 из Lecture Notes in Computer Science, стр. 214-229. Springer, (2007)AMY: Use your cell phone to create a protected personal network over devices., , , и . IEEE Trans. Consumer Electron., 57 (1): 99-104 (2011)A Performance/Energy Analysis and Optimization of Multi-Core Architectures with Voltage Scaling Techniques., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (6): 1215-1225 (2010)