Search

Your search keyword '"Sadeghi, Ahmad-Reza"' showing total 1,265 results

Search Constraints

Start Over You searched for: Author "Sadeghi, Ahmad-Reza" Remove constraint Author: "Sadeghi, Ahmad-Reza"
1,265 results on '"Sadeghi, Ahmad-Reza"'

Search Results

103. Market-Driven Code Provisioning to Mobile Secure Hardware

104. Smart and Secure Cross-Device Apps for the Internet of Advanced Things

106. Intelligent Security: Is 'AI for Cybersecurity' a Blessing or a Curse (Dagstuhl Seminar 22412)

107. FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning

111. Token-Based Cloud Computing : Secure Outsourcing of Data and Arbitrary Computations with Lower Latency

112. Anonymous Authentication with TLS and DAA

113. Key Attestation from Trusted Execution Environments

114. MoP-2-MoP – Mobile Private Microblogging

115. On the (In)Security of Mobile Two-Factor Authentication

116. Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks

118. Marionette: Manipulate Your Touchscreen via a Charging Cable

125. Intelligent Security: Is 'AI for Cybersecurity' a Blessing or a Curse (Dagstuhl Seminar 22412)

126. Advanced Topics

128. Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets

129. On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs

130. CrowdShare: Secure Mobile Resource Sharing

131. Client-Controlled Cryptography-as-a-Service in the Cloud

132. Bringing Zero-Knowledge Proofs of Knowledge to Practice

133. The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs

134. PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon

135. Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs

136. Softer Smartcards : Usable Cryptographic Tokens with Secure Execution

137. CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm

138. Converse PUF-Based Authentication

139. SmartTokens: Delegable Access Control with NFC-Enabled Smartphones

140. hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers

141. On Constructing Homomorphic Encryption Schemes from Coding Theory

142. TruWalletM: Secure Web Authentication on Mobile Platforms

143. Twin Clouds: Secure Cloud Computing with Low Latency : (Full Version)

144. Recyclable PUFs: Logically Reconfigurable PUFs

145. Trustworthy Clouds Underpinning the Future Internet

146. Secure Set Intersection with Untrusted Hardware Tokens

147. Privilege Escalation Attacks on Android

148. Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices

149. Video Streaming Forensic – Content Identification with Traffic Snooping

150. Close the Gate: Detecting Backdoored Models in Federated Learning based on Client-Side Deep Layer Output Analysis

Catalog

Books, media, physical & digital resources