From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem., , , , , , , , , и 1 other автор(ы). USENIX Security Symposium, стр. 273-290. USENIX Association, (2018)Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities., и . Secur. Commun. Networks, (2019)LBM: A Security Framework for Peripherals within the Linux Kernel., , , , , и . IEEE Symposium on Security and Privacy, стр. 967-984. IEEE, (2019)A Hybrid Approach to Secure Function Evaluation using SGX., , , , , , , и . AsiaCCS, стр. 100-113. ACM, (2019)Privacy preserving localization using a distributed particle filtering protocol., , , , , и . MILCOM, стр. 835-840. IEEE, (2017)Explainable Black-Box Attacks Against Model-based Authentication., , , , и . CoRR, (2018)A Practical Intel SGX Setting for Linux Containers in the Cloud., , , , и . CODASPY, стр. 255-266. ACM, (2019)Privacy-Preserving Localization using Enclaves., , , , , , , и . UEMCON, стр. 269-278. IEEE, (2021)One-Time Programs Made Practical., , , , , , и . Financial Cryptography, том 11598 из Lecture Notes in Computer Science, стр. 646-666. Springer, (2019)Brittle Features of Device Authentication., , , , , и . CODASPY, стр. 53-64. ACM, (2021)