From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Do you know where your cloud files are?, , и . CCSW, стр. 73-82. ACM, (2011)Aggregate and Verifiably Encrypted Signatures from Bilinear Maps., , , и . EUROCRYPT, том 2656 из Lecture Notes in Computer Science, стр. 416-432. Springer, (2003)Short Unique Signatures from RSA with a Tight Security Reduction (in the Random Oracle Model).. Financial Cryptography, том 10957 из Lecture Notes in Computer Science, стр. 61-79. Springer, (2018)Retrofitting Fine Grain Isolation in the Firefox Renderer (Extended Version)., , , , , , , и . CoRR, (2020)Measuring the Practical Impact of DNSSEC Deployment., , , и . USENIX Security Symposium, стр. 573-588. USENIX Association, (2013)Welcome to the Entropics: Boot-Time Entropy in Embedded Devices., , , , и . IEEE Symposium on Security and Privacy, стр. 589-603. IEEE Computer Society, (2013)Mouse Trap: Exploiting Firmware Updates in USB Peripherals., , , и . WOOT, USENIX Association, (2014)Gobi: WebAssembly as a Practical Path to Library Sandboxing., , , , и . CoRR, (2019)You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems., , , и . EVT, USENIX Association, (2008)Constant-Time Wasmtime, for Real This Time: End-to-End Verified Zero-Overhead Constant-Time Programming for the Web and Beyond., и . CoRR, (2023)