60 results on '"Sadeghi, Ahmad-Reza"'
Search Results
2. Recyclable PUFs: logically reconfigurable PUFs
3. Trusted virtual domains: Color your network
4. Studieren mit Sicherheit in Bochum: Die Studiengänge zum Thema IT-Sicherheit
5. Complementing zero-knowledge watermark detection: Proving properties of embedded information without revealing it
6. Watermark detection with zero-knowledge disclosure
7. Towards multilaterally secure computing platforms—with open source and trusted computing
8. With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security.
9. Trusted Execution Environments: Properties, Applications, and Challenges.
10. Key agreement for heterogeneous mobile ad-hoc groups
11. AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication.
12. ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
13. HardIDX: Practical and secure index with SGX in a malicious environment.
14. Security analysis on consumer and industrial IoT devices.
15. CryptoML: Secure outsourcing of big data machine learning applications.
16. ACM CCS 2016 Interview, Part 3.
17. ACM CCS 2016 Interviews, Part 2.
18. ACM CCS 2016 Interviews, Part 1.
19. Security & Privacy Week Interviews, Part 3.
20. Readactor: Practical Code Randomization Resilient to Memory Disclosure.
21. Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
22. TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
23. Compacting privacy-preserving k-nearest neighbor search using logic synthesis.
24. TyTAN: Tiny trust anchor for tiny devices.
25. HAFIX: Hardware-Assisted Flow Integrity eXtension.
26. Security and privacy challenges in industrial Internet of Things.
27. Security & Privacy Week Interviews, Part 2.
28. Security & Privacy Week Interviews, Part 1.
29. Remanence Decay Side-Channel: The PUF Case.
30. The Cybersecurity Landscape in Industrial Control Systems.
31. You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks.
32. Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation.
33. PUFatt: Embedded platform attestation based on novel processor-based PUFs.
34. Five Freedoms for the Homo Deus.
35. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
36. EDA for secure and dependable cybercars.
37. PUF-based secure test wrapper design for cryptographic SoC testing.
38. Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing.
39. Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure.
40. Legal Protection of Real Property in Afghan Law.
41. Mobile Trusted Computing.
42. The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
43. A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design.
44. La protection de la propriété terrienne entre loi et arbitrages.
45. Privacy-Preserving ECG Classification With Branching Programs and Neural Networks.
46. Towards automated security policy enforcement in multi-tenant virtual data centers.
47. Games without Frontiers: Whither Information Security and Privacy?
48. Changing the Game of Software Security.
49. Security and Privacy More Crucial than Ever.
50. Automated Software Diversity.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.