From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure automated document delivery., , , и . ACSAC, стр. 348-356. IEEE, (1989)Reconciling Multiple IPsec and Firewall Policies., , , и . Security Protocols Workshop, том 5964 из Lecture Notes in Computer Science, стр. 81-97. Springer, (2007)Generating Channel Ids in Virtual World Operating Systems (Extended Abstract).. Security Protocols Workshop, том 7061 из Lecture Notes in Computer Science, стр. 71-73. Springer, (2010)Digital Copy Protection Scheme Using Recording Medium Identifier., , и . ICPP Workshops, стр. 174-178. IEEE Computer Society, (1999)Security of Internet Location Management., , и . ACSAC, стр. 78-87. IEEE Computer Society, (2002)CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization., , , , , , , , , и 5 other автор(ы). IEEE Symposium on Security and Privacy, стр. 20-37. IEEE Computer Society, (2015)Cryptography and evidence. University of Cambridge, UK, (1997)British Library, EThOS.CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety., , , , , , , , , и 1 other автор(ы). MICRO, стр. 545-557. ACM, (2019)Cornucopia: Temporal Safety for CHERI Heaps., , , , , , , , , и 14 other автор(ы). SP, стр. 608-625. IEEE, (2020)Scanning electronic documents for personally identifiable information., , и . WPES, стр. 41-50. ACM, (2006)