Van Bulck, L
26  Ergebnisse:
Personensuche X
?
1

Comparison of Hydrogen Reduction of Different Lead-Bearing ..:

, In: The Minerals, Metals & Materials Series; New Directions in Mineral Processing, Extractive Metallurgy, Recycling and Waste Minimization,
Rukini, A. ; Rhamdhani, M. A. ; Brooks, G. A.. - p. 187-197 , 2023
 
?
2

Methods for Global Media and Communication Governance Resea..:

, In: Global Communication Governance at the Crossroads; Global Transformations in Media and Communication Research - A Palgrave and IAMCR Series,
Puppis, Manuel ; Van den Bulck, Hilde - p. 371-387 , 2023
 
?
3

About Time: On the Challenges of Temporal Guarantees in Unt..:

, In: Proceedings of the 6th Workshop on System Software for Trusted Execution,
 
?
4

MicroProfiler: Principled Side-Channel Mitigation through M..:

, In: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P),
Bognar, Marton ; Winderix, Hans ; Van Bulck, Jo. - p. 651-670 , 2023
 
?
5

Mind the Gap: Studying the Insecurity of Provably Secure Em..:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
Bognar, Marton ; Van Bulck, Jo ; Piessens, Frank - p. 1638-1655 , 2022
 
?
6

Aion: Enabling Open Systems through Strong Availability Gua..:

, In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security,
Alder, Fritz ; Van Bulck, Jo ; Piessens, Frank. - p. 1357-1372 , 2021
 
?
7

Plundervolt: Software-based Fault Injection Attacks against..:

, In: 2020 IEEE Symposium on Security and Privacy (SP),
Murdock, Kit ; Oswald, David ; Garcia, Flavio D.... - p. 1466-1482 , 2020
 
?
8

LVI: Hijacking Transient Execution through Microarchitectur..:

, In: 2020 IEEE Symposium on Security and Privacy (SP),
 
?
9

Faulty Point Unit: ABI Poisoning Attacks on Intel SGX:

, In: Annual Computer Security Applications Conference,
Alder, Fritz ; Van Bulck, Jo ; Oswald, David. - p. 415-427 , 2020
 
?
10

Provably Secure Isolation for Interruptible Enclaved Execut..:

, In: 2020 IEEE 33rd Computer Security Foundations Symposium (CSF),
Busi, Matteo ; Noorman, Job ; Bulck, Jo Van... - p. 262-276 , 2020
 
?
11

How Celebrities Emerge and Evolve by Means of Mass Mediated..:

, In: The Oxford handbook of gossip and reputation / edited by Francesca Giardini and Rafael Wittek
Link: https://doi.org/10.1093/..

Exemplar:  Zentrale:E02 a soz 629 mb/224
 
?
12

Analyzing Policy-Making I: Stakeholder and Advocacy Coaliti..:

, In: The Palgrave Handbook of Methods for Media Policy Research,
Van den Bulck, Hilde - p. 451-469 , 2019
 
?
13

A Tale of Two Worlds : Assessing the Vulnerability of En..:

, In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
Van Bulck, Jo ; Oswald, David ; Marin, Eduard... - p. 1741-1758 , 2019
 
?
14

ZombieLoad : Cross-Privilege-Boundary Data Sampling:

, In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
Schwarz, Michael ; Lipp, Moritz ; Moghimi, Daniel... - p. 753-768 , 2019
 
?
15

Public Service Media in a Divided Country: Governance and F..:

, In: Public Service Broadcasting and Media Systems in Troubled European Democracies,
 
1-15