From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trusted Subjects Configuration Based on TE Model in MLS Systems., и . INTRUST, том 6802 из Lecture Notes in Computer Science, стр. 98-107. Springer, (2010)An Integrity Assurance Mechanism for Run-Time Programs., , и . Inscrypt, том 5487 из Lecture Notes in Computer Science, стр. 389-405. Springer, (2008)Trusted Reputation Management Service for Peer-to-Peer Collaboration., , и . OTM Conferences (2), том 5332 из Lecture Notes in Computer Science, стр. 1069-1086. Springer, (2008)HyperVerify: A VM-assisted Architecture for Monitoring Hypervisor Non-control Data., , , и . SERE (Companion), стр. 26-34. IEEE, (2013)Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization., , и . ISPEC, том 7232 из Lecture Notes in Computer Science, стр. 289-300. Springer, (2012)Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework., , , и . ISPEC, том 5451 из Lecture Notes in Computer Science, стр. 83-92. Springer, (2009)A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty., , , и . Inscrypt, том 4318 из Lecture Notes in Computer Science, стр. 196-210. Springer, (2006)An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper)., , , и . ICICS, том 4307 из Lecture Notes in Computer Science, стр. 322-331. Springer, (2006)Tibetan Number Identification Based on Classification of Number Components in Tibetan Word Segmentation., , , , , и . COLING (Posters), стр. 719-724. Chinese Information Processing Society of China, (2010)Verifying the Safety of Xen Security Modules., , и . SSIRI (Companion), стр. 30-34. IEEE Computer Society, (2011)