From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Introducing Code Assets of a New White-Box Security Modeling Language., , , и . COMPSAC Workshops, стр. 116-121. IEEE Computer Society, (2014)Enhanced Operating System Protection to Support Digital Forensic Investigations., , , , и . TrustCom/BigDataSE/ICESS, стр. 650-659. IEEE Computer Society, (2017)A New Perspective on Providing Cloud Computing Security - A Position Paper., , , , и . CLOSER, стр. 650-655. SciTePress, (2011)An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs., , , и . ISC, том 2200 из Lecture Notes in Computer Science, стр. 144-155. Springer, (2001)Information Hiding in Software with Mixed Boolean-Arithmetic Transforms., , , и . WISA, том 4867 из Lecture Notes in Computer Science, стр. 61-75. Springer, (2007)Towards defending connected vehicles against attacks., , , и . ECBS, стр. 9:1-9:9. ACM, (2017)White-box cryptography: practical protection on hostile hosts., , , , и . SSPREW@ACSAC, стр. 4:1-4:8. ACM, (2016)A compiler-based infrastructure for software-protection., , и . PLAS, стр. 33-44. ACM, (2008)TRUST-CAP: A Trust Model for Cloud-Based Applications., , , и . COMPSAC (2), стр. 584-589. IEEE Computer Society, (2017)978-1-5386-0367-3.