From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Predictable programs in barcodes., , , и . CASES, стр. 298-303. ACM, (2002)Forms of Semantic Specification.. Current Trends in Theoretical Computer Science, том 40 из World Scientific Series in Computer Science, World Scientific, (1993)A model-based approach to integrating security policies for embedded devices., , и . EMSOFT, стр. 211-219. ACM, (2004)Safety in discretionary access control for logic-based publish-subscribe systems., , и . SACMAT, стр. 3-12. ACM, (2009)Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware., и . CoRR, (2014)Enforcing Executing-Implies-Verified with the Integrity-Aware Processor., и . TRUST, том 6740 из Lecture Notes in Computer Science, стр. 202-216. Springer, (2011)Privacy Sensitive Location Information Systems in Smart Buildings., , и . SPC, том 3934 из Lecture Notes in Computer Science, стр. 149-164. Springer, (2006)Modeling and detecting anomalous topic access., , , , , и . ISI, стр. 100-105. IEEE, (2013)Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets., , , , , , , , и . ACM Conference on Computer and Communications Security, стр. 883-894. ACM, (2016)Formal software engineering., , и . ACM SIGSOFT Softw. Eng. Notes, 25 (1): 54 (2000)