From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

HotChips security tutorial., , , и . Hot Chips Symposium, стр. 1-5. IEEE, (2014)Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning., , , , и . TrustCom/BigDataSE, стр. 160-167. IEEE, (2019)SoK: Hardware Defenses Against Speculative Execution Attacks., , и . CoRR, (2023)ActionBert: Leveraging User Actions for Semantic Understanding of User Interfaces., , , , , , , , и . CoRR, (2020)Hardware-rooted trust for secure key management and transient trust., и . ACM Conference on Computer and Communications Security, стр. 389-400. ACM, (2007)Implicit Authentication for Smartphone Security., и . ICISSP (Revised Selected Papers), том 576 из Communications in Computer and Information Science, стр. 160-176. Springer, (2015)Validating Word-Oriented Processors for Bit and Multi-word Operations., , и . Asia-Pacific Computer Systems Architecture Conference, том 3189 из Lecture Notes in Computer Science, стр. 473-488. Springer, (2004)Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture., , , , , , , и . TRUST, том 5471 из Lecture Notes in Computer Science, стр. 133-152. Springer, (2009)How secure is your cache against side-channel attacks?, и . MICRO, стр. 341-353. ACM, (2017)Random Fill Cache Architecture., и . MICRO, стр. 203-215. IEEE Computer Society, (2014)