From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?. IACR Cryptology ePrint Archive, (2015)nQUIC: Noise-Based QUIC Packet Protection., , , и . EPIQ@CoNEXT, стр. 22-28. ACM, (2018)SoK: What don't we know? Understanding Security Vulnerabilities in SNARKs., , , , , и . CoRR, (2024)Sparsity-Assisted Fault Feature Enhancement: Algorithm-Aware Versus Model-Aware., , , , , и . IEEE Trans. Instrum. Meas., 69 (9): 7004-7014 (2020)An Extreme Function Theory for Novelty Detection., , , , и . IEEE J. Sel. Top. Signal Process., 7 (1): 28-37 (2013)Nathu IR System at NTCIR-II., , , , , , и . NTCIR, National Institute of Informatics (NII), (2001)Security and Reliability in Concordia., , и . HICSS (7), стр. 44-53. IEEE Computer Society, (1998)nQUIC: Noise-Based QUIC Packet Protection., , , и . IACR Cryptology ePrint Archive, (2019)The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations., , , , , и . IACR Cryptology ePrint Archive, (2018)Modelling Scale in Geographical Information Science. Edited by Nicholas J. Tate and Peter M. Atkinson (Chichester: John Wiley and Sons, 2002). Pp xv+277. ISBN 0-471-98546-5. Hardback.. Int. J. Geogr. Inf. Sci., 18 (1): 99-100 (2004)