117 results on '"Asokan, N"'
Search Results
2. Concept Three
3. Extraction of Complex DNN Models: Real Threat or Boogeyman?
4. chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change
5. Secure Deduplication of Encrypted Data: Refined Model and New Constructions
6. Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews
7. Randomization Can’t Stop BPF JIT Spray
8. CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers
9. Smart and Secure Cross-Device Apps for the Internet of Advanced Things
10. LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling
11. On Making Emerging Trusted Execution Environments Accessible to Developers
12. Platform Security Research
13. Enterprise Security Extensions
14. Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing
15. Platform Comparison
16. Security of OS-Level Virtualization Technologies
17. Mobile Platforms
18. Mobile Platform Security
19. Mobile Hardware Security
20. Introduction
21. Conclusions
22. Platform Security Model
23. CrowdShare: Secure Mobile Resource Sharing
24. The Untapped Potential of Trusted Execution Environments on Mobile Devices
25. PeerShare: A System Secure Distribution of Sensitive Data among Social Contacts
26. Use of Ratings from Personalized Communities for Trustworthy Application Installation
27. Authenticated Encryption Primitives for Size-Constrained Trusted Computing
28. Credential Disabling from Trusted Execution Environments
29. Usable Mobile Security
30. Can Hand-Held Computers Still Be Better Smart Cards?
31. Towards User-Friendly Credential Transfer on Open Credential Platforms
32. Key Attestation from Trusted Execution Environments
33. External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing
34. Usability Analysis of Secure Pairing Methods
35. Ad Hoc Security Associations for Groups
36. Man-in-the-Middle in Tunnelled Authentication Protocols
37. Secure Vickrey Auctions without Threshold Trust
38. State of the art in electronic payment systems
39. Optimistische Mehrparteien-Vertragsunterzeichnung
40. Protecting the computation results of free-roaming agents
41. Optimistic fair exchange of digital signatures
42. Server-Supported Signatures
43. Security Associations in Personal Networks: A Comparative Analysis
44. A Platform for OnBoard Credentials
45. Enabling Fairer Digital Rights Management with Trusted Computing
46. Securing Peer-to-Peer Distributions for Mobile Devices
47. LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling.
48. On Making Emerging Trusted Execution Environments Accessible to Developers.
49. Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
50. Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.