From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Securing TEEs With Verifiable Execution Contracts., и . IEEE Trans. Dependable Secur. Comput., 20 (4): 3222-3237 (июля 2023)Reusable Enclaves for Confidential Serverless Computing., , , , , и . USENIX Security Symposium, стр. 4015-4032. USENIX Association, (2023)Accurate Inference of Rice Biomass Based on Support Vector Machine., , , , и . CCTA (1), том 478 из IFIP Advances in Information and Communication Technology, стр. 356-365. (2015)SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution., , , , , и . CoRR, (2018)Defeating Speculative-Execution Attacks on SGX with HyperRace., , , и . DSC, стр. 1-8. IEEE, (2019)Understanding and Identifying Cross-Platform UI Framework Based Potentially Unwanted Apps., , , и . GLOBECOM, стр. 6705-6710. IEEE, (2023)Towards Formal Verification of State Continuity for Enclave Programs., , , и . USENIX Security Symposium, стр. 573-590. USENIX Association, (2021)Specularizer : Detecting Speculative Execution Attacks via Performance Tracing., , , , и . DIMVA, том 12756 из Lecture Notes in Computer Science, стр. 151-172. Springer, (2021)Secure Hierarchical Deterministic Wallet Supporting Stealth Address., , , , и . ESORICS (1), том 13554 из Lecture Notes in Computer Science, стр. 89-109. Springer, (2022)Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX., , , , , , , и . CCS, стр. 2421-2434. ACM, (2017)