Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms., and . EuroS&P, page 546-560. IEEE, (2017)A Hybrid Scheme for Authenticating Scalable Video Codestreams., , , and . IEEE Trans. Inf. Forensics Secur., 9 (4): 543-553 (2014)Coercion resistance in authentication responsibility shifting., , and . AsiaCCS, page 97-98. ACM, (2012)FastKLEE: faster symbolic execution via reducing redundant bound checking of type-safe pointers., , , and . ESEC/SIGSOFT FSE, page 1741-1745. ACM, (2022)A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces., and . SP, page 1902-1918. IEEE, (2021)Hardware-Assisted Fine-Grained Code-Reuse Attack Detection., , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 66-85. Springer, (2015)Technique for authenticating H.264/SVC streams in surveillance applications., , , , , and . ICME Workshops, page 1-4. IEEE Computer Society, (2013)A Method for Fast Revocation of Public Key Certificates and Security Capabilities., , , and . USENIX Security Symposium, USENIX, (2001)No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption., , , and . Communications and Multimedia Security, volume 7394 of Lecture Notes in Computer Science, page 72-86. Springer, (2012)Hierarchical Identity-Based Chameleon Hash and Its Applications., , , , and . ACNS, volume 6715 of Lecture Notes in Computer Science, page 201-219. (2011)