Search for persons
X
?
2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) ,
3
Strengthening PUFs using Composition:
, In:
?
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy ,
4
The Limits of the Trade-Off Between Query-Anonymity and Com..:
, In:
?
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security ,
6
The UNIX Process Identity Crisis : A Standards-Driven Ap..:
, In:
?
Proceedings of the 18th ACM symposium on Access control models and technologies ,
8
Least-restrictive enforcement of the Chinese wall security ..:
, In:
?
Proceedings of the 18th ACM symposium on Access control models and technologies ,
9
Property-testing real-world authorization systems:
, In:
?
Proceedings of the Eighth Symposium on Usable Privacy and Security ,
11
Relating declarative semantics and usability in access cont..:
, In:
?
Proceedings of the 49th Annual Design Automation Conference ,
12
Reliable computing with ultra-reduced instruction set co-pr..:
, In:
?
Proceedings of the 16th ACM symposium on Access control models and technologies ,
13
An authorization scheme for version control systems:
, In:
?
Proceedings of the 15th ACM symposium on Access control models and technologies ,
14
Session details: Policy analysis:
, In:
?
Proceedings of the 15th ACM symposium on Access control models and technologies ,
15