History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 212 total

PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs. (English)
DAC, 1-6(2014)
WorldCat.org
1
A trusted versioning file system for passive mobile storage devices. (English)
J. Network and Computer ApplicationsJ. Network and Computer Applications 38, 65-75(2014)
WorldCat.org
2
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. (English)
IEEE Transactions on Information Forensics and SecurityIEEE Transactions on Information Forensics and Security 9, N0. 2, 221-232(2014)
WorldCat.org
3
Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities. (English)
FASE, 155-169(2014)
WorldCat.org
4
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks. (English)
ESORICS (1), 76-93(2014)
WorldCat.org
5
You Can Call but You Can’t Hide: Detecting Caller ID Spoofing Attacks. (English)
DSN, 168-179(2014)
WorldCat.org
6
On Offline Payments with Bitcoin (Poster Abstract). (English)
Financial Cryptography Workshops, 159-160(2014)
WorldCat.org
7
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. (English)
USENIX Security, 401-416(2014)
WorldCat.org
8
ConXsense: automated context classification for context-aware access control. (English)
ASIACCS, 293-304(2014)
WorldCat.org
9
On the (In)Security of Mobile Two-Factor Authentication. (English)
Financial Cryptography, 365-383(2014)
WorldCat.org
10
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices. (English)
ACM Conference on Computer and Communications Security, 880-891(2014)
WorldCat.org
11
MoP-2-MoP - Mobile Private Microblogging. (English)
Financial Cryptography, 384-396(2014)
WorldCat.org
12
ASM: A Programmable Interface for Extending Android Security. (English)
USENIX Security, 1005-1019(2014)
WorldCat.org
13
Mobile Trusted Computing. (English)
Proceedings of the IEEEProceedings of the IEEE 102, N0. 8, 1189-1206(2014)
WorldCat.org
14
Optimal operation of distributed generation in power systems considering uncertainty effects through probabilistic load flow. (English)
Journal of Intelligent and Fuzzy SystemsJournal of Intelligent and Fuzzy Systems 27, N0. 3, 1479-1485(2014)
WorldCat.org
15
Crowdshare: secure mobile resource sharing. (English)
Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25‒28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 432-440 (2013).
WorldCat.org
16
Client-controlled cryptography-as-a-service in the cloud. (English)
Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25‒28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 19-36 (2013).
WorldCat.org
17
On the effectiveness of the remanence decay side-channel to clone memory-based pufs. (English)
Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20‒23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 107-125 (2013).
WorldCat.org
18
Financial cryptography and data security. 17th international conference, FC 2013, Okinawa, Japan, April 1‒5, 2013. Revised selected papers. (English)
Lecture Notes in Computer Science 7859. Berlin: Springer (ISBN 978-3-642-39883-4/pbk). xv, 406~p. EUR~66.34 (2013).
WorldCat.org
19
A note on solving the fuzzy Sylvester matrix equation. (English)
J. Comput. Anal. Appl. 15, No. 1, 10-22 (2013).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 212 total

Valid XHTML 1.0 Transitional Valid CSS!