From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cheap Hardware Parallelism Implies Cheap Security., и . FDTC, стр. 80-91. IEEE Computer Society, (2007)Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms., , и . MobiSec, том 17 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 71-82. Springer, (2009)On the Implementation of the Advanced Encryption Standard on a Public-key Crypto-Coprocessor., и . CARDIS, стр. 135-146. USENIX, (2002)Advances on Access-Driven Cache Attacks on AES., и . Selected Areas in Cryptography, том 4356 из Lecture Notes in Computer Science, стр. 147-162. Springer, (2006)Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform., , , и . TRUST, том 6101 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2010)Experimental Analysis of the Femtocell Location Verification Techniques., , и . NordSec, том 7127 из Lecture Notes in Computer Science, стр. 49-54. Springer, (2010)Hardware-software integrated approaches to defend against software cache-based side channel attacks., , , и . HPCA, стр. 393-404. IEEE Computer Society, (2009)pBMDS: a behavior-based malware detection system for cellphone devices., , , и . WISEC, стр. 37-48. ACM, (2010)On the Complexity of Computing Short Linearly Independent Vectors and Short Bases in a Lattice., и . STOC, стр. 711-720. ACM, (1999)Anatomy of Commercial IMSI Catchers and Detectors., , , и . Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2019)