Personensuche
X
?
The Minerals, Metals & Materials Series; New Directions in Mineral Processing, Extractive Metallurgy, Recycling and Waste Minimization ,
1
Comparison of Hydrogen Reduction of Different Lead-Bearing ..:
, In:
?
Global Communication Governance at the Crossroads; Global Transformations in Media and Communication Research - A Palgrave and IAMCR Series ,
2
Methods for Global Media and Communication Governance Resea..:
, In:
?
Proceedings of the 6th Workshop on System Software for Trusted Execution ,
3
About Time: On the Challenges of Temporal Guarantees in Unt..:
, In:
?
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) ,
4
MicroProfiler: Principled Side-Channel Mitigation through M..:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
5
Mind the Gap: Studying the Insecurity of Provably Secure Em..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
6
Aion: Enabling Open Systems through Strong Availability Gua..:
, In:
?
2020 IEEE Symposium on Security and Privacy (SP) ,
7
Plundervolt: Software-based Fault Injection Attacks against..:
, In:
?
2020 IEEE Symposium on Security and Privacy (SP) ,
8
LVI: Hijacking Transient Execution through Microarchitectur..:
, In:
?
Annual Computer Security Applications Conference ,
9
Faulty Point Unit: ABI Poisoning Attacks on Intel SGX:
, In:
?
2020 IEEE 33rd Computer Security Foundations Symposium (CSF) ,
10
Provably Secure Isolation for Interruptible Enclaved Execut..:
, In:
?
The Oxford handbook of gossip and reputation / edited by Francesca Giardini and Rafael Wittek
11
How Celebrities Emerge and Evolve by Means of Mass Mediated..:
, In:
?
The Palgrave Handbook of Methods for Media Policy Research ,
12
Analyzing Policy-Making I: Stakeholder and Advocacy Coaliti..:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
13
A Tale of Two Worlds : Assessing the Vulnerability of En..:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
14
ZombieLoad : Cross-Privilege-Boundary Data Sampling:
, In:
?
Public Service Broadcasting and Media Systems in Troubled European Democracies ,
15