Search

Your search keyword '"Akram, Raja Naeem"' showing total 219 results

Search Constraints

Start Over You searched for: Author "Akram, Raja Naeem" Remove constraint Author: "Akram, Raja Naeem"
219 results on '"Akram, Raja Naeem"'

Search Results

1. Return-Oriented Programming on RISC-V

2. Deep Learning Application in Security and Privacy -- Theory and Practice: A Position Paper

3. An evaluation of the security of the Bitcoin Peer-to- Peer Network

4. E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy

5. Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance

6. Consumer Centric Data Control, Tracking and Transparency -- A Position Paper

7. EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

8. Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones

9. Serverless Protocols for Inventory and Tracking with a UAV

11. Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems

12. A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service

13. An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks

14. Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks

15. Challenges of Security and Trust of Mobile Devices as Digital Avionics Component

16. When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data

17. Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments

18. Remote Credential Management with Mutual Attestation for Trusted Execution Environments

19. Deep Learning Application in Security and Privacy – Theory and Practice: A Position Paper

20. Philanthropy on the Blockchain

21. EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

22. A Secure and Trusted Channel Protocol for UAVs Fleets

23. May the Force Be with You: Force-Based Relay Attack Detection

25. Proximity Assurances Based on Natural and Artificial Ambient Environments

26. An Exploratory Analysis of the Security Risks of the Internet of Things in Finance

27. Enhancing EMV Tokenisation with Dynamic Transaction Tokens

28. Log Your Car: Reliable Maintenance Services Record

32. Secure Application Execution in Mobile Devices

35. Secure and Trusted Application Execution on Embedded Devices

36. Let’s Get Mobile: Secure FOTA for Automotive System

37. Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks

39. End-to-End Secure and Privacy Preserving Mobile Chat Application

40. Rethinking the Smart Card Technology

44. Philanthropy on the Blockchain

48. Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators

49. Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture

50. Application-Binding Protocol in the User Centric Smart Card Ownership Model

Catalog

Books, media, physical & digital resources