History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 222 total

Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? (English)
ASIACCS, 55-61(2015)
WorldCat.org
1
XiOS: Extended Application Sandboxing on iOS. (English)
ASIACCS, 43-54(2015)
WorldCat.org
2
I Know Where You are: Proofs of Presence Resilient to Malicious Provers. (English)
ASIACCS, 567-577(2015)
WorldCat.org
3
Market-Driven Code Provisioning to Mobile Secure Hardware. (English)
Financial Cryptography, 387-404(2015)
WorldCat.org
4
HAFIX: hardware-assisted flow integrity extension. (English)
DAC, 74:1-74:6(2015)
WorldCat.org
5
Guest Editorial Special Section on Hardware Security and Trust. (English)
IEEE Trans. on CAD of Integrated Circuits and SystemsIEEE Trans. on CAD of Integrated Circuits and Systems 34, N0. 6, 873-874(2015)
WorldCat.org
6
Compacting privacy-preserving k-nearest neighbor search using logic synthesis. (English)
DAC, 36:1-36:6(2015)
WorldCat.org
7
TyTAN: tiny trust anchor for tiny devices. (English)
DAC, 34:1-34:6(2015)
WorldCat.org
8
Security and privacy challenges in industrial internet of things. (English)
DAC, 54:1-54:6(2015)
WorldCat.org
9
Smart and Secure Cross-Device Apps for the Internet of Advanced Things. (English)
Financial Cryptography, 272-290(2015)
WorldCat.org
10
Mining the categorized software repositories to improve the analysis of security vulnerabilities. (English)
Gnesi, Stefania (ed.) et al., Fundamental approaches to software engineering. 17th international conference, FASE 2014, held as part of the European joint conferences on theory and practice of software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings. Berlin: Springer (ISBN 978-3-642-54803-1/pbk). Lecture Notes in Computer Science 8411, 155-169 (2014).
WorldCat.org
11
Mobile Trusted Computing. (English)
Proceedings of the IEEEProceedings of the IEEE 102, N0. 8, 1189-1206(2014)
WorldCat.org
12
You Can Call but You Can’t Hide: Detecting Caller ID Spoofing Attacks. (English)
DSN, 168-179(2014)
WorldCat.org
13
MoP-2-MoP - Mobile Private Microblogging. (English)
Financial Cryptography, 384-396(2014)
WorldCat.org
14
A trusted versioning file system for passive mobile storage devices. (English)
J. Network and Computer ApplicationsJ. Network and Computer Applications 38, 65-75(2014)
WorldCat.org
15
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices. (English)
ACM Conference on Computer and Communications Security, 880-891(2014)
WorldCat.org
16
ConXsense: automated context classification for context-aware access control. (English)
ASIACCS, 293-304(2014)
WorldCat.org
17
Swap and Play: Live Updating Hypervisors and Its Application to Xen. (English)
CCSW, 33-44(2014)
WorldCat.org
18
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs. (English)
DAC, 109:1-109:6(2014)
WorldCat.org
19
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation. (English)
DAC, 133:1-133:6(2014)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 222 total

Valid XHTML 1.0 Transitional Valid CSS!