From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Guest Editors' Introduction: Secure Automotive Systems., , и . IEEE Des. Test, 36 (6): 5-6 (2019)FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks., , , , и . ACSAC, стр. 647-661. ACM, (2023)Peek-a-boo: i see your smart home activities, even encrypted!, , , , , , , , и . WISEC, стр. 207-218. ACM, (2020)RIP-RH: Preventing Rowhammer-based Inter-Process Attacks., , , , и . AsiaCCS, стр. 561-572. ACM, (2019)On the Security of Strong Memristor-based Physically Unclonable Functions., , , и . DAC, стр. 1-6. IEEE, (2020)Towards Systematic Design of Collective Remote Attestation Protocols., , , , , и . ICDCS, стр. 1188-1198. IEEE, (2019)Five Freedoms for the Homo Deus., , и . IEEE Secur. Priv., 16 (3): 15-17 (2018)SafeTEE: Combining Safety and Security on ARM-based Microcontrollers., , , , и . DATE, стр. 520-525. IEEE, (2022)POSE: Practical Off-chain Smart Contract Execution., , , , , , и . NDSS, The Internet Society, (2023)V0LTpwn: Attacking x86 Processor Integrity from Software., , , , и . USENIX Security Symposium, стр. 1445-1461. USENIX Association, (2020)