From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The protection of LP-WAN Endpoints via TEE: a Chemical Storage Case Study., , , , , и . ISSRE Workshops, стр. 345-352. IEEE, (2021)Multimodal Architectures: Issues and Experiences., , , , , , и . OTM Workshops (1), том 4277 из Lecture Notes in Computer Science, стр. 974-983. Springer, (2006)Tool and Method for Evaluating Students Working on E-Learning Platforms.. DMS, стр. 200-203. Knowledge Systems Institute, (2011)Improving the QoS of MPEG2 streaming over wireless LANs., , , и . Simul. Model. Pract. Theory, 11 (7-8): 533-555 (2003)Protecting Critical Business Processes of Smart Hospitals from Cyber Attacks., , , , , и . SITIS, стр. 363-367. IEEE, (2019)A comprehensive survey of hardware-assisted security: From the edge to the cloud., , , и . Internet Things, (2019)Awesome Trusted Execution Environment., , и . DSN-S, стр. 5-6. IEEE, (2023)Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth Auditing., , , , и . ITASEC, том 2940 из CEUR Workshop Proceedings, стр. 298-308. CEUR-WS.org, (2021)Carry-Save Montgomery Modular Exponentiation on Reconfigurable Hardware., , , и . DATE, стр. 206-211. IEEE Computer Society, (2004)A Resilient Architecture for Forensic Storage of Events in Critical Infrastructures., , , , и . HASE, стр. 48-55. IEEE Computer Society, (2012)