From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure software installation in a mobile environment., и . SOUPS, том 229 из ACM International Conference Proceeding Series, стр. 155-156. ACM, (2007)Protecting Web Passwords from Rogue Servers using Trusted Execution Environments., , , , и . CoRR, (2017)PAC it up: Towards Pointer Integrity using ARM Pointer Authentication., , , , , и . USENIX Security Symposium, стр. 177-194. USENIX Association, (2019)Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks., , , , , и . USENIX Security Symposium, стр. 1433-1450. USENIX Association, (2023)Auditing Framework APIs via Inferred App-side Security Specifications., , , и . USENIX Security Symposium, стр. 6061-6077. USENIX Association, (2023)Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing., , , и . Financial Cryptography, том 8437 из Lecture Notes in Computer Science, стр. 349-364. Springer, (2014)WAFFLE: Watermarking in Federated Learning., , , и . SRDS, стр. 310-320. IEEE, (2021)Authenticated Call Stack., , , и . DAC, стр. 223. ACM, (2019)LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling., , и . TRUST, том 9229 из Lecture Notes in Computer Science, стр. 143-162. Springer, (2015)Checksum gestures: continuous gestures as an out-of-band channel for secure pairing., , , , , , и . UbiComp, стр. 391-401. ACM, (2015)