From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Phoolproof Phishing Prevention., , и . Financial Cryptography, том 4107 из Lecture Notes in Computer Science, стр. 1-19. Springer, (2006)Bootstrapping Trust in a "Trusted" Platform.. HotSec, USENIX Association, (2008)Secure sensor network routing: a clean-slate approach., , , и . CoNEXT, стр. 11. ACM, (2006)A Direct Construction for Asymptotically Optimal zkSNARKs., , и . IACR Cryptol. ePrint Arch., (2020)Transparency Dictionaries with Succinct Proofs of Correct Operation., , , и . NDSS, The Internet Society, (2022)Portcullis: protecting connection setup from denial-of-capability attacks., , , , , и . SIGCOMM, стр. 289-300. ACM, (2007)Vale: Verifying High-Performance Cryptographic Assembly Code., , , , , , , , и . USENIX Security Symposium, стр. 917-934. USENIX Association, (2017)Missive: Fast Application Launch From an Untrusted Buffer Cache., , , и . USENIX Annual Technical Conference, стр. 145-156. USENIX Association, (2014)Fast Geometric Projections for Local Robustness Certification., , , , и . ICLR, OpenReview.net, (2021)EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider., , , , , , , , , и 6 other автор(ы). SP, стр. 983-1002. IEEE, (2020)