Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Scheme for Authenticating Scalable Video Codestreams., , , and . IEEE Trans. Inf. Forensics Secur., 9 (4): 543-553 (2014)On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms., and . EuroS&P, page 546-560. IEEE, (2017)Coercion resistance in authentication responsibility shifting., , and . AsiaCCS, page 97-98. ACM, (2012)FastKLEE: faster symbolic execution via reducing redundant bound checking of type-safe pointers., , , and . ESEC/SIGSOFT FSE, page 1741-1745. ACM, (2022)A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces., and . SP, page 1902-1918. IEEE, (2021)Hardware-Assisted Fine-Grained Code-Reuse Attack Detection., , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 66-85. Springer, (2015)Technique for authenticating H.264/SVC streams in surveillance applications., , , , , and . ICME Workshops, page 1-4. IEEE Computer Society, (2013)A Method for Fast Revocation of Public Key Certificates and Security Capabilities., , , and . USENIX Security Symposium, USENIX, (2001)T-Counter: Trustworthy and Efficient CPU Resource Measurement Using SGX in the Cloud., , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 867-885 (2023)On the Root of Trust Identification Problem., , and . IPSN, page 315-327. ACM, (2021)