Search for persons
X
?
Proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy ,
1
A TOCTOU Attack on DICE Attestation:
, In:
?
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy ,
2
The Cost of OSCORE and EDHOC for Constrained Devices:
, In:
?
2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) ,
3
Protecting RESTful IoT Devices from Battery Exhaustion DoS ..:
, In:
?
Proceedings of the 9th International Conference on Telecommunications and Remote Sensing ,
4
Unmanned Traffic Management - Motivation and Future Perspec..:
, In:
?
Proceedings of the 9th International Conference on Telecommunications and Remote Sensing ,
5
Improving Resilience Using Drones for Effective Monitoring ..:
, In:
?
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security ,
6
The Lazarus Effect: Healing Compromised Devices in the Inte..:
, In:
?
Proceedings of the 6th International Conference on Telecommunications and Remote Sensing ,
7