From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tug-of-War: Observations on Unified Content Handling., , , , , и . CoRR, (2017)Cryptography as an operating system service: A case study., , , и . ACM Trans. Comput. Syst., 24 (1): 1-38 (2006)IntFlow: improving the accuracy of arithmetic error detection using information flow tracking., , , , и . ACSAC, стр. 416-425. ACM, (2014)Self-healing multitier architectures using cascading rescue points., , и . ACSAC, стр. 379-388. ACM, (2012)That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing Mechanisms., , и . WPES@CCS, стр. 71-81. ACM, (2016)Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs., , и . Inscrypt, том 5487 из Lecture Notes in Computer Science, стр. 157-180. Springer, (2008)Randomized Instruction Sets and Runtime Environments Past Research and Future Directions.. IEEE Secur. Priv., 7 (1): 18-25 (2009)Privacy as an Operating System Service., , и . HotSec, USENIX Association, (2006)Transparent ROP Exploit Mitigation Using Indirect Branch Tracing., , и . USENIX Security Symposium, стр. 447-462. USENIX Association, (2013)A Survey of Voice over IP Security Research.. ICISS, том 5905 из Lecture Notes in Computer Science, стр. 1-17. Springer, (2009)