Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution., , and . EC2ND, page 1-8. IEEE Computer Society, (2011)Measuring integrity on mobile phone systems., , , , and . SACMAT, page 155-164. ACM, (2008)DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers., , and . POLICY, page 95-102. IEEE Computer Society, (2010)Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware., , , , and . GLOBECOM, page 1-6. IEEE, (2010)Outlook: Cloudy with a Chance of Security Challenges and Improvements., and . IEEE Security & Privacy, 8 (1): 77-80 (2010)The SMM Rootkit Revisited: Fun with USB., and . ARES, page 279-286. IEEE Computer Society, (2014)Cloud Verifier: Verifiable Auditing Service for IaaS Clouds., , , and . SERVICES, page 239-246. IEEE Computer Society, (2013)Clinical Workflows for Collecting Family Health History in Primary Care., , , , , , , , , and 3 other author(s). AMIA, AMIA, (2018)Justifying Integrity Using a Virtual Machine Verifier., , , , and . ACSAC, page 83-92. IEEE Computer Society, (2009)Scalable Web Content Attestation., , , , and . ACSAC, page 95-104. IEEE Computer Society, (2009)