Search for persons
X
?
2024 IEEE 10th International Conference on Network Softwarization (NetSoft) ,
1
Building the Cloud Continuum with REAR:
, In:
?
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy ,
3
HAT: Secure and Practical Key Establishment for Implantable..:
, In:
?
Smart Card Research and Advanced Applications; Lecture Notes in Computer Science ,
8
FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resou..:
, In:
?
2022 IEEE Conference on Dependable and Secure Computing (DSC) ,
9
Symbolon: Enabling Flexible Multi-device-based User Authent..:
, In:
?
Annual Computer Security Applications Conference ,
10
Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture..:
, In:
?
Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services ,
11
PPFL : privacy-preserving federated learning with truste..:
, In:
?
Proceedings of the 1st Workshop on Flexible Resource and Application Management on the Edge ,
12
Inter-operability and Orchestration in Heterogeneous Cloud/..:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
14
A Tale of Two Worlds : Assessing the Vulnerability of En..:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
15