Personensuche
X
?
Formal Techniques for Distributed Objects, Components, and Systems; Lecture Notes in Computer Science ,
1
Formally Verifying a Rollback-Prevention Protocol for TEEs:
, In:
?
2023 IEEE 36th Computer Security Foundations Symposium (CSF) ,
2
Optimally Hiding Object Sizes with Constrained Padding:
, In:
?
Proceedings of the 39th Annual Computer Security Applications Conference ,
3
Prioritizing Remediation of Enterprise Hosts by Malware Exe..:
, In:
?
Proceedings of the 24th International Middleware Conference ,
5
EESMR : Energy Efficient BFT---SMR for the masses:
, In:
?
IEEE INFOCOM 2023 - IEEE Conference on Computer Communications ,
6
Nimble: Fast and Safe Migration of Network Functions:
, In:
?
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy ,
7
Tackling Credential Abuse Together:
, In:
?
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) ,
8
Privately Evaluating Region Overlaps with Applications to C..:
, In:
?
Advances in Information Security; Cyber Deception ,
9
Using Amnesia to Detect Credential Database Breaches:
, In:
?
Advances in Information Security; Cyber Deception ,
10
Deceiving ML-Based Friend-or-Foe Identification for Executa..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
12
ENGRAFT : Enclave-guarded Raft on Byzantine Faulty Nodes:
, In:
?
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security ,
14