From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms., и . TrustCom, стр. 1155-1160. IEEE Computer Society, (2012)Securing the Linux Boot Process: From Start to Finish., , и . ICISSP, стр. 604-610. SCITEPRESS, (2021)A Revisit of Attestable Nodes for Networked Applications., и . ARES, стр. 122:1-122:7. ACM, (2022)Revisiting the Challenges of Input Parsing for Robust and Secure Software., и . ICSSA, стр. 41-45. IEEE, (2019)Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform., и . TRUST, том 7904 из Lecture Notes in Computer Science, стр. 106-114. Springer, (2013)DISA - A Blockchain-Based Distributed Information Security Audit., , , , , и . iiWAS, том 14416 из Lecture Notes in Computer Science, стр. 27-34. Springer, (2023)A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing., , , , , и . TGC, том 4912 из Lecture Notes in Computer Science, стр. 156-168. Springer, (2007)A Curious Exploration of Malicious PDF Documents., , и . ICISSP, стр. 577-584. SCITEPRESS, (2020)Trusted Identity Management for Overlay Networks., , , , и . ISPEC, том 7863 из Lecture Notes in Computer Science, стр. 16-30. Springer, (2013)Security concepts for a distributed architecture for activity logging and analysis., , , , , , и . I-KNOW, стр. 23:1-23:6. ACM, (2014)