Personensuche
X
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
1
A User-Centric Approach to API Delegations: Enforcing Priva..:
, In:
?
Lecture Notes in Computer Science; Information Security ,
2
TC4SE: A High-Performance Trusted Channel Mechanism for Sec..:
, In:
?
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) ,
3
Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up Study:
, In:
?
Network and System Security; Lecture Notes in Computer Science ,
4
T3E: A Practical Solution to Trusted Time in Secure Enclave:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
5
A Quantitative Assessment of the Detection Performance of W..:
, In:
?
Proceedings of the 19th International Conference on Managed Programming Languages and Runtimes ,
6
SecSharp: Towards Efficient Trusted Execution in Managed La..:
, In:
?
Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses ,
7
OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosy..:
, In:
?
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security ,
14