Search

Your search keyword '"Sadeghi, Ahmad-Reza"' showing total 18 results

Search Constraints

Start Over You searched for: Author "Sadeghi, Ahmad-Reza" Remove constraint Author: "Sadeghi, Ahmad-Reza" Topic computer security Remove constraint Topic: computer security
18 results on '"Sadeghi, Ahmad-Reza"'

Search Results

1. ASSURED

2. With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security.

3. On the Security of Strong Memristor-based Physically Unclonable Functions.

4. ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.

5. HardIDX: Practical and secure index with SGX in a malicious environment.

6. Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.

7. Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.

8. GarbledCPU: A MIPS Processor for Secure Computation in Hardware.

9. ACM CCS 2016 Interviews, Part 1.

10. Security & Privacy Week Interviews, Part 3.

11. The Cybersecurity Landscape in Industrial Control Systems.

12. Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.

13. A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design.

14. Towards automated security policy enforcement in multi-tenant virtual data centers.

15. Changing the Game of Software Security.

16. Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing

17. Risks of Offline Verify PIN on Contactless Cards

18. A Simple Key-Recovery Attack on McOE-X

Catalog

Books, media, physical & digital resources