Ibrahim Ahmad
514  Ergebnisse:
Personensuche X
?
1

Development of Secured Network Design for Small Enterprise ..:

, In: 2023 International Conference on Engineering Technology and Technopreneurship (ICE2T),
 
?
2

FetchBench: Systematic Identification and Characterization ..:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
 
?
3

Microarchitectural Leakage Templates and Their Application ..:

, In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security,
Ibrahim, Ahmad ; Nemati, Hamed ; Schlüter, Till.. - p. 1489-1503 , 2022
 
?
4

Optimising QoS-Assurance, Resource Usage and Cost of Fog Ap..:

, In: Communications in Computer and Information Science; Cloud Computing and Services Science,
Brogi, Antonio ; Forti, Stefano ; Ibrahim, Ahmad - p. 168-189 , 2019
 
?
5

Towards Systematic Design of Collective Remote Attestation ..:

, In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS),
 
?
6

HEALED: HEaling & Attestation for Low-End Embedded Devices:

, In: Financial Cryptography and Data Security; Lecture Notes in Computer Science,
 
?
7

CHASE: A Configurable Hardware-Assisted Security Extension ..:

, In: 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD),
 
?
9

Securing Embedded Networks through Secure Collective Attest..:

, In: Proceedings of the 2018 Workshop on MobiSys 2018 Ph.D. Forum,
Ibrahim, Ahmad - p. 1-2 , 2018
 
?
10

The future of IoT security : special session:

, In: Proceedings of the International Conference on Embedded Software,
Mohan, Sibin ; Asplund, Mikael ; Bloom, Gedare... - p. 1-7 , 2018
 
?
11

SCIoT: A Secure and sCalable End-to-End Management Framewor..:

, In: Computer Security; Lecture Notes in Computer Science,
Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad.. - p. 595-617 , 2018
 
?
12

LiteHAX : lightweight hardware-assisted attestation of p..:

, In: Proceedings of the International Conference on Computer-Aided Design,
 
?
13

ATRIUM : runtime attestation resilient under memory atta..:

, In: Proceedings of the 36th International Conference on Computer-Aided Design,
Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando... - p. 384-391 , 2017
 
?
14

SeED : secure non-interactive attestation for embedded d..:

, In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
 
?
15

How to Best Deploy Your Fog Applications, Probably:

, In: 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC),
Brogi, Antonio ; Forti, Stefano ; Ibrahim, Ahmad - p. 105-114 , 2017
 
1-15