From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS., , , , , и . CoRR, (2018)PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses., , , , , и . MICRO, стр. 28-41. IEEE, (2020)Privacy Preserving Face Recognition Utilizing Differential Privacy., , , , и . Comput. Secur., (2020)A Performance Evaluation of Public Cloud Using TPC-C., , , , , и . ICSOC Workshops, том 7759 из Lecture Notes in Computer Science, стр. 3-13. Springer, (2013)A Needle in a Haystack: Finding a Suitable Lightweight IoT Authentication Protocol and Improving Its Usability., , , и . TPS-ISA, стр. 46-54. IEEE, (2020)Design and Evaluation of an Integrated Collaboration Platform for Secure Information Sharing., , , , и . CDVE, том 9929 из Lecture Notes in Computer Science, стр. 185-193. (2016)Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signatures., , , , и . ACNS, том 11464 из Lecture Notes in Computer Science, стр. 67-88. Springer, (2019)A Method to Obtain Signatures from Honeypots Data., , и . NPC, том 3222 из Lecture Notes in Computer Science, стр. 435-442. Springer, (2004)Privacy-Preserving and Outsourced Multi-user K-Means Clustering., , , , и . CIC, стр. 80-89. IEEE Computer Society, (2015)Spread Spectrum Steganographic Capacity Improvement for Medical Image Security in Teleradiology., , , и . EMBC, стр. 1-4. IEEE, (2018)