From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Java Card Virtual Machine Compromising from a Bytecode Verified Applet., и . CARDIS, том 9514 из Lecture Notes in Computer Science, стр. 75-88. Springer, (2015)The ultimate control flow transfer in a Java based smart card., и . Comput. Secur., (2015)Memory Forensics of a Java Card Dump., , , , , , и . CARDIS, том 8968 из Lecture Notes in Computer Science, стр. 3-17. Springer, (2014)Heap ... Hop! Heap Is Also Vulnerable., , , и . CARDIS, том 8968 из Lecture Notes in Computer Science, стр. 18-31. Springer, (2014)Trust can be misplaced., , , и . J. Cryptographic Engineering, 7 (1): 21-34 (2017)Evaluation of the Ability to Transform SIM Applications into Hostile Applications., , , , и . CARDIS, том 7079 из Lecture Notes in Computer Science, стр. 1-17. Springer, (2011)Electromagnetic fault injection against a complex CPU, toward new micro-architectural fault models., , , , и . J. Cryptogr. Eng., 11 (4): 353-367 (2021)Reversing the operating system of a Java based smart card., и . J. Comput. Virol. Hacking Tech., 10 (4): 239-253 (2014)Type Classification against Fault Enabled Mutant in Java Based Smart Card., , , и . ARES, стр. 551-556. IEEE Computer Society, (2012)Combined Software and Hardware Attacks on the Java Card Control Flow., , и . CARDIS, том 7079 из Lecture Notes in Computer Science, стр. 283-296. Springer, (2011)