From post

Management of Integrity-Enforced Virtual Applications.

, , и . STA Workshops, том 187 из Communications in Computer and Information Science, стр. 138-145. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms., и . TrustCom, стр. 1155-1160. IEEE Computer Society, (2012)Towards Resilient Artificial Intelligence: Survey and Research Issues., , , , , , , , и . CSR, стр. 536-542. IEEE, (2021)Position Paper: A Path Towards Ubiquitous Protection of Media., , и . WASH, том 1011 из CEUR Workshop Proceedings, CEUR-WS.org, (2013)Lightweight Distributed Heterogeneous Attested Android Clouds., , и . TRUST, том 7344 из Lecture Notes in Computer Science, стр. 122-141. Springer, (2012)Revisiting the Challenges of Input Parsing for Robust and Secure Software., и . ICSSA, стр. 41-45. IEEE, (2019)Semi-automated Prototyping of a TPM v2 Software and Hardware Simulation Platform., и . TRUST, том 7904 из Lecture Notes in Computer Science, стр. 106-114. Springer, (2013)Securing the Linux Boot Process: From Start to Finish., , и . ICISSP, стр. 604-610. SCITEPRESS, (2021)A Revisit of Attestable Nodes for Networked Applications., и . ARES, стр. 122:1-122:7. ACM, (2022)DISA - A Blockchain-Based Distributed Information Security Audit., , , , , и . iiWAS, том 14416 из Lecture Notes in Computer Science, стр. 27-34. Springer, (2023)Security concepts for a distributed architecture for activity logging and analysis., , , , , , и . I-KNOW, стр. 23:1-23:6. ACM, (2014)