From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Feasibility study of a camera-based PUF in a realistic scenario., , , , , и . ARES, стр. 31:1-31:6. ACM, (2020)PenGym: Pentesting Training Framework for Reinforcement Learning Agents., , , , и . ICISSP, стр. 498-509. SCITEPRESS, (2024)Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes., , , , и . COSADE, том 12244 из Lecture Notes in Computer Science, стр. 43-67. Springer, (2020)Lattice-based Signcryption with Equality Test in Standard Model., , , , , и . CoRR, (2020)A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework., , , и . Security and Management, стр. 323-329. CSREA Press, (2010)Experiment on Side-Channel Key-Recovery using a Real LPWA End-device., , , , , и . ICISSP, стр. 67-74. SciTePress, (2019)Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem., , , , и . IWSEC, том 12835 из Lecture Notes in Computer Science, стр. 23-41. Springer, (2021)Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers., , , , , и . EuroS&P Workshops, стр. 113-121. IEEE, (2017)Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme., , , и . ICETE (Selected Papers), том 314 из Communications in Computer and Information Science, стр. 233-248. Springer, (2011)White-box Implementation of Stream Cipher., , и . ICISSP, стр. 263-269. SciTePress, (2017)