1,265 results on '"Sadeghi, Ahmad-Reza"'
Search Results
102. Advanced PUF Concepts
103. Market-Driven Code Provisioning to Mobile Secure Hardware
104. Smart and Secure Cross-Device Apps for the Internet of Advanced Things
105. Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms
106. Intelligent Security: Is 'AI for Cybersecurity' a Blessing or a Curse (Dagstuhl Seminar 22412)
107. FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning
108. Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
109. Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version)*
110. Enhancing RFID Security and Privacy by Physically Unclonable Functions
111. Token-Based Cloud Computing : Secure Outsourcing of Data and Arbitrary Computations with Lower Latency
112. Anonymous Authentication with TLS and DAA
113. Key Attestation from Trusted Execution Environments
114. MoP-2-MoP – Mobile Private Microblogging
115. On the (In)Security of Mobile Two-Factor Authentication
116. Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks
117. Physical Security Primitives : A Survey on Physically Unclonable Functions and PUF-Based Security Solutions
118. Marionette: Manipulate Your Touchscreen via a Charging Cable
119. Hardware control flow integrity
120. SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices
121. DARWIN: Survival of the Fittest Fuzzing Mutators
122. Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning
123. POSE: Practical Off-chain Smart Contract Execution
124. AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms
125. Intelligent Security: Is 'AI for Cybersecurity' a Blessing or a Curse (Dagstuhl Seminar 22412)
126. Advanced Topics
127. Securing the Access to Electronic Health Records on Mobile Phones
128. Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets
129. On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs
130. CrowdShare: Secure Mobile Resource Sharing
131. Client-Controlled Cryptography-as-a-Service in the Cloud
132. Bringing Zero-Knowledge Proofs of Knowledge to Practice
133. The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs
134. PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
135. Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs
136. Softer Smartcards : Usable Cryptographic Tokens with Secure Execution
137. CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm
138. Converse PUF-Based Authentication
139. SmartTokens: Delegable Access Control with NFC-Enabled Smartphones
140. hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers
141. On Constructing Homomorphic Encryption Schemes from Coding Theory
142. TruWalletM: Secure Web Authentication on Mobile Platforms
143. Twin Clouds: Secure Cloud Computing with Low Latency : (Full Version)
144. Recyclable PUFs: Logically Reconfigurable PUFs
145. Trustworthy Clouds Underpinning the Future Internet
146. Secure Set Intersection with Untrusted Hardware Tokens
147. Privilege Escalation Attacks on Android
148. Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
149. Video Streaming Forensic – Content Identification with Traffic Snooping
150. Close the Gate: Detecting Backdoored Models in Federated Learning based on Client-Side Deep Layer Output Analysis
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.