From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Architecting against Software Cache-Based Side-Channel Attacks., , , и . IEEE Trans. Computers, 62 (7): 1276-1288 (2013)On the Complexity of Computing Short Linearly Independent Vectors and Short Bases in a Lattice., и . STOC, стр. 711-720. ACM, (1999)Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform., , , и . TRUST, том 6101 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2010)Hardware-software integrated approaches to defend against software cache-based side channel attacks., , , и . HPCA, стр. 393-404. IEEE Computer Society, (2009)Experimental Analysis of the Femtocell Location Verification Techniques., , и . NordSec, том 7127 из Lecture Notes in Computer Science, стр. 49-54. Springer, (2010)Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms., , и . MobiSec, том 17 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 71-82. Springer, (2009)Cheap Hardware Parallelism Implies Cheap Security., и . FDTC, стр. 80-91. IEEE Computer Society, (2007)On the Implementation of the Advanced Encryption Standard on a Public-key Crypto-Coprocessor., и . CARDIS, стр. 135-146. USENIX, (2002)Duality between Multiplication and Modular Reduction., и . IACR Cryptology ePrint Archive, (2005)On the Power of Simple Branch Prediction Analysis., , и . IACR Cryptology ePrint Archive, (2006)