From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Avoid a Void: The Eradication of Null Dereferencing., , и . Reflections on the Work of C. A. R. Hoare, Springer, (2010)On the Security of Strong Memristor-based Physically Unclonable Functions., , , и . DAC, стр. 1-6. IEEE, (2020)SafeTEE: Combining Safety and Security on ARM-based Microcontrollers., , , , и . DATE, стр. 520-525. IEEE, (2022)New Microsoft Component Technologies., и . TOOLS (34), стр. 393-394. IEEE Computer Society, (2000)In Hardware We Trust? From TPM to Enclave Computing on RISC-V., , , и . VLSI-SoC, стр. 1-6. IEEE, (2021)System Architecture Designs for Secure, Flexible and Openly-Accessible Enclave Computing.. Technical University of Darmstadt, Germany, (2022)Offline Model Guard: Secure and Private ML on Mobile Devices., , , , , , , и . DATE, стр. 460-465. IEEE, (2020)A Metric Framework for Object-Oriented Development., , и . TOOLS (39), стр. 164-172. IEEE Computer Society, (2001)Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures., , , , и . NDSS, The Internet Society, (2022)CURE: A Security Architecture with CUstomizable and Resilient Enclaves., , , , , , и . USENIX Security Symposium, стр. 1073-1090. USENIX Association, (2021)