From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security-as-a-Service for Embedded Systems., , , , , , , , , и 1 other автор(ы). MILCOM, стр. 691-695. IEEE, (2023)Multicast Group Communication as a Base for a Load-Balancing Replicated Data Service., , и . DISC, том 1499 из Lecture Notes in Computer Science, стр. 258-272. Springer, (1998)A Client-Server Approach to Virtually Synchronous Group Multicast: Specifications and Algorithms., и . ICDCS, стр. 344-355. IEEE Computer Society, (2000)An inheritance-based technique for building simulation proofs incrementally., , , и . ICSE, стр. 478-487. ACM, (2000)A Wide Area Network Simulation of Single-Round Group Membership Algorithms., и . NCA, стр. 159-170. IEEE Computer Society, (2005)Parsing with Prefix and Suffix Dictionaries., и . Data Compression Conference, стр. 180-189. IEEE Computer Society, (1996)Using Leader-Based Communication to Improve the Scalability of Single-Round Group Membership Algorithms., и . IPDPS, IEEE Computer Society, (2005)Leveraging Intel SGX Technology to Protect Security-Sensitive Applications., , , и . NCA, стр. 1-5. IEEE, (2018)Practical Principle of Least Privilege for Secure Embedded Systems., , , , , , , , , и . RTAS, стр. 1-13. IEEE, (2021)SHAMROCK: self contained cryptography and key management processor., , , , и . ACM Conference on Computer and Communications Security, стр. 1419-1420. ACM, (2013)