From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enforcing Access Controls for the Cryptographic Cloud Service Invocation Based on Virtual Machine Introspection., , , и . ISC, том 11060 из Lecture Notes in Computer Science, стр. 213-230. Springer, (2018)PIV4DB: Probabilistic Integrity Verification for Cloud Database., , , , и . ISCC, стр. 1-7. IEEE, (2020)RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks., , , , , и . SEC, том 471 из IFIP Advances in Information and Communication Technology, стр. 293-307. Springer, (2016)Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes., , , и . SecureComm, том 50 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 307-325. Springer, (2010)SEGIVE: A Practical Framework of Secure GPU Execution in Virtualization Environment., , , , и . IPCCC, стр. 1-10. IEEE, (2020)ABLE: Zero-effort Two-factor Authentication Exploiting BLE Co-location., , , , , и . WCNC, стр. 992-997. IEEE, (2022)You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks., , , , , и . TrustCom, стр. 266-273. IEEE, (2022)ImCT: A Feasible Scheme for Deploying Implicit Certificates with Certificate Transparency in IoT., , , , , и . ICCCN, стр. 1-10. IEEE, (2023)RegKey: A Register-based Implementation of ECC Signature Algorithms Against One-shot Memory Disclosure., , , , , и . ACM Trans. Embed. Comput. Syst., 22 (6): 97:1-97:22 (ноября 2023)Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory., , , , , , и . IEEE Trans. Dependable Secur. Comput., 18 (3): 1196-1213 (2021)