From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Faster and Better: Detecting Vulnerabilities in Linux-based IoT Firmware with Optimized Reaching Definition Analysis., , , , , , , и . NDSS, The Internet Society, (2024)Ultra High Throughput Implementations for MD5 Hash Algorithm on FPGA., , , и . HPCA (China), том 5938 из Lecture Notes in Computer Science, стр. 433-441. Springer, (2009)An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment., , , , и . ICCNS, стр. 6-10. ACM, (2016)Is your access allowed or not? A Verified Tag-based Access Control Framework for the Multi-domain TEE., , , , , , и . Internetware, стр. 252-261. ACM, (2022)A Process Model for Forensic Analysis of Symbian Smart Phones., , , , и . FGIT-ASEA, том 59 из Communications in Computer and Information Science, стр. 86-93. Springer, (2009)Algorithm Analysis for Big Data in Education Based on Depth Learning., и . Wireless Personal Communications, 102 (4): 3111-3119 (2018)Towards a multilayered permission-based access control for extending Android security., , , , , , , и . Concurr. Comput. Pract. Exp., (2018)A Shape-inference-based Approach to Enhance Constraint Independence Optimization., , , и . ICCSP, стр. 141-145. ACM, (2020)Analysis of Cryptographic Algorithms' Characters in Binary File., , , и . PDCAT, стр. 219-223. IEEE, (2012)Implementing a hardware-assisted memory management mechanism for ARM platforms using the B method., , , , , и . Concurr. Comput. Pract. Exp., (2019)