From post

An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks.

, , , и . NSS, том 7645 из Lecture Notes in Computer Science, стр. 192-205. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms., и . EuroS&P, стр. 546-560. IEEE, (2017)Coercion resistance in authentication responsibility shifting., , и . AsiaCCS, стр. 97-98. ACM, (2012)Hardware-Assisted Fine-Grained Code-Reuse Attack Detection., , и . RAID, том 9404 из Lecture Notes in Computer Science, стр. 66-85. Springer, (2015)A Hybrid Scheme for Authenticating Scalable Video Codestreams., , , и . IEEE Trans. Inf. Forensics Secur., 9 (4): 543-553 (2014)FastKLEE: faster symbolic execution via reducing redundant bound checking of type-safe pointers., , , и . ESEC/SIGSOFT FSE, стр. 1741-1745. ACM, (2022)A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces., и . SP, стр. 1902-1918. IEEE, (2021)A Method for Fast Revocation of Public Key Certificates and Security Capabilities., , , и . USENIX Security Symposium, USENIX, (2001)Technique for authenticating H.264/SVC streams in surveillance applications., , , , , и . ICME Workshops, стр. 1-4. IEEE Computer Society, (2013)Embellishing Text Search Queries To Protect User Privacy., , и . Proc. VLDB Endow., 3 (1): 598-607 (2010)ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks., , , , и . NDSS, The Internet Society, (2014)