From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

pBMDS: a behavior-based malware detection system for cellphone devices., , , и . WISEC, стр. 37-48. ACM, (2010)Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform., , , и . TRUST, том 6101 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2010)Anatomy of Commercial IMSI Catchers and Detectors., , , и . Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2019)On the Implementation of the Advanced Encryption Standard on a Public-key Crypto-Coprocessor., и . CARDIS, стр. 135-146. USENIX, (2002)On the Complexity of Computing Short Linearly Independent Vectors and Short Bases in a Lattice., и . STOC, стр. 711-720. ACM, (1999)Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems., , , , и . NDSS, The Internet Society, (2016)Advances on Access-Driven Cache Attacks on AES., и . Selected Areas in Cryptography, том 4356 из Lecture Notes in Computer Science, стр. 147-162. Springer, (2006)Hardware-software integrated approaches to defend against software cache-based side channel attacks., , , и . HPCA, стр. 393-404. IEEE Computer Society, (2009)Experimental Analysis of the Femtocell Location Verification Techniques., , и . NordSec, том 7127 из Lecture Notes in Computer Science, стр. 49-54. Springer, (2010)A Secure DVB Set-Top Box via Trusting Computing Technologies., , и . CCNC, стр. 1-8. IEEE, (2009)