Personensuche
X
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
1
The SA4P Framework: Sensing and Actuation as a Privilege:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
2
Element Distinctness and Bounded Input Size in Private Set ..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
3
Acoustic Side-Channel Attacks on a Computer Mouse:
, In:
?
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking ,
4
ProvCam: A Camera Module with Self-Contained TCB for Produc..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
5
Poster: Control-Flow Integrity in Low-end Embedded Devices:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
6
Caveat (IoT) Emptor: Towards Transparency of IoT Device Pre..:
, In:
?
2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD) ,
7
$\mathcal{P}\text{ARseL}$: Towards a Verified Root-of-Trust..:
, In:
?
Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services ,
8
Vronicle : verifiable provenance for videos from mobile ..:
, In:
?
2022 IEEE International Conference on Pervasive Computing and Communications (PerCom) ,
9
Privacy-Friendly De-authentication with BLUFADE: Blurred Fa..:
, In:
?
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design ,
10
CASU : Compromise Avoidance via Secure Update for Low-En..:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
11
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack ..:
, In:
?
Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services ,
12
Vronicle : verifiable provenance for videos from mobile ..:
, In:
?
2022 IEEE Wireless Communications and Networking Conference (WCNC) ,
13
SEDIMENT: An IoT-device-centric Methodology for Scalable 5G..:
, In:
?
Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services ,
14
Vronicle : verifiable provenance for videos from mobile ..:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
15