From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Effects of charge-based computation non-idealities on CMOS image compression sensors., , , , и . ISCAS, IEEE, (2006)A CMOS Front-End for a Lossy Image Compression Sensor., , , , и . ISCAS, стр. 2838-2841. IEEE, (2007)On Design of Single-Layer and Multilayer Code-Based Linkable Ring Signatures., , , и . IEEE Access, (2020)On Design of Blockchain-based Transport Scheme., , , и . BSCI, стр. 214-215. ACM, (2020)Towards Memory Safe Enclave Programming with Rust-SGX., , , , , , , , , и . ACM Conference on Computer and Communications Security, стр. 2333-2350. ACM, (2019)AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services., , и . CCS, стр. 799-813. ACM, (2017)SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings., , , и . CCS, стр. 1631-1645. ACM, (2022)SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution., , , , , и . CoRR, (2018)You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps., , , , , и . USENIX Security Symposium, стр. 657-690. USENIX Association, (2015)Towards Formal Verification of State Continuity for Enclave Programs., , , и . USENIX Security Symposium, стр. 573-590. USENIX Association, (2021)