Personensuche
X
?
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies ,
1
The Hardness of Learning Access Control Policies:
, In:
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
3
Finding Unchecked Low-Level Calls with Zero False Positives..:
, In:
?
Communications in Computer and Information Science; Emerging Information Security and Applications ,
4
Granularity and Usability in Authorization Policies:
, In:
?
2022 IEEE 35th Computer Security Foundations Symposium (CSF) ,
6
Locked Circuit Indistinguishability: A Notion of Security f..:
, In:
?
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies ,
7
The Secrecy Resilience of Access Control Policies and Its A..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
8
Forensic Analysis in Access Control : Foundations and a ..:
, In:
?
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy ,
12
Session details: Session 9: Virtualization and Hardware:
, In:
?
Proceedings of the Great Lakes Symposium on VLSI 2017 ,
13
The Need for Declarative Properties in Digital IC Security:
, In:
?
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy ,
14
Graph Automorphism-Based, Semantics-Preserving Security for..:
, In:
?
Proceedings of the 36th International Conference on Computer-Aided Design ,
15