From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Leakage Resilience against Concurrent Cache Attacks., , , и . POST, том 8414 из Lecture Notes in Computer Science, стр. 140-158. Springer, (2014)A Language-Theoretic View on Network Protocols., , и . ATVA, том 10482 из Lecture Notes in Computer Science, стр. 363-379. Springer, (2017)Probabilistic Relational Reasoning for Differential Privacy., , , и . ACM Trans. Program. Lang. Syst., 35 (3): 9:1-9:49 (2013)Theory and Practice of Finding Eviction Sets., , и . CoRR, (2018)Rethinking Privacy in Machine Learning Pipelines from an Information Flow Control Perspective., , , , , , , , и . CoRR, (2023)On Aggregation of Information in Timing Attacks., и . EuroS&P, стр. 387-400. IEEE, (2019)Analyzing Information Leakage of Updates to Natural Language Models., , , , , , , и . CCS, стр. 363-375. ACM, (2020)Loophole: Timing Attacks on Shared Event Loops in Chrome., и . USENIX Security Symposium, стр. 849-864. USENIX Association, (2017)Rigorous analysis of software countermeasures against cache attacks., и . PLDI, стр. 406-421. ACM, (2017)Information-Theoretic Bounds for Differentially Private Mechanisms., и . CSF, стр. 191-204. IEEE Computer Society, (2011)