Author of the publication

Detection of Denial-of-Message Attacks on Sensor Network Broadcasts.

, , , and . IEEE Symposium on Security and Privacy, page 64-78. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture., , , , and . TRUST, volume 6101 of Lecture Notes in Computer Science, page 141-165. Springer, (2010)Parametric Verification of Address Space Separation., , , , and . POST, volume 7215 of Lecture Notes in Computer Science, page 51-68. Springer, (2012)Towards Sound Detection of Virtual Machines., , , , , and . Botnet Detection, volume 36 of Advances in Information Security, Springer, (2008)CLAMP: Practical Prevention of Large-Scale Data Leaks., , , , and . IEEE Symposium on Security and Privacy, page 154-169. IEEE Computer Society, (2009)Memoir: Practical State Continuity for Protected Modules., , , , and . IEEE Symposium on Security and Privacy, page 379-394. IEEE Computer Society, (2011)Bootstrapping Trust in Commodity Computers., , and . IEEE Symposium on Security and Privacy, page 414-429. IEEE Computer Society, (2010)Device-Enabled Authorization in the Grey-System., , , , , and . ISC, volume 3650 of Lecture Notes in Computer Science, page 431-445. Springer, (2005)OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms., , , , , and . ACM Conference on Computer and Communications Security, page 13-24. ACM, (2013)A study of mass-mailing worms., , , and . WORM, page 1-10. ACM Press, (2004)Shamon: A System for Distributed Mandatory Access Control., , , , and . ACSAC, page 23-32. IEEE Computer Society, (2006)