Search

Your search keyword '"Sadeghi, Ahmad-Reza"' showing total 60 results

Search Constraints

Start Over You searched for: Author "Sadeghi, Ahmad-Reza" Remove constraint Author: "Sadeghi, Ahmad-Reza" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
60 results on '"Sadeghi, Ahmad-Reza"'

Search Results

8. With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security.

9. Trusted Execution Environments: Properties, Applications, and Challenges.

10. Key agreement for heterogeneous mobile ad-hoc groups

11. AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication.

12. ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.

13. HardIDX: Practical and secure index with SGX in a malicious environment.

16. ACM CCS 2016 Interview, Part 3.

17. ACM CCS 2016 Interviews, Part 2.

18. ACM CCS 2016 Interviews, Part 1.

19. Security & Privacy Week Interviews, Part 3.

27. Security & Privacy Week Interviews, Part 2.

28. Security & Privacy Week Interviews, Part 1.

29. Remanence Decay Side-Channel: The PUF Case.

30. The Cybersecurity Landscape in Industrial Control Systems.

34. Five Freedoms for the Homo Deus.

36. EDA for secure and dependable cybercars.

37. PUF-based secure test wrapper design for cryptographic SoC testing.

41. Mobile Trusted Computing.

42. The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.

43. A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design.

44. La protection de la propriété terrienne entre loi et arbitrages.

45. Privacy-Preserving ECG Classification With Branching Programs and Neural Networks.

46. Towards automated security policy enforcement in multi-tenant virtual data centers.

47. Games without Frontiers: Whither Information Security and Privacy?

48. Changing the Game of Software Security.

Catalog

Books, media, physical & digital resources