Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization., , , , , , and . CoRR, (2017)SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version)., , , and . IACR Cryptology ePrint Archive, (2012)SmartTokens: Delegable Access Control with NFC-Enabled Smartphones., , , and . TRUST, volume 7344 of Lecture Notes in Computer Science, page 219-238. Springer, (2012)Secure Free-Floating Car Sharing for Offline Cars., and . CODASPY, page 349-360. ACM, (2017)MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones., , , , , , , and . NDSS, The Internet Society, (2012)Hands Off my Database: Ransomware Detection in Databases through Dynamic Analysis of Query Sequences., , , , and . CoRR, (2019)Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer., , , , , , and . CODASPY, page 233-242. ACM, (2013)Poster: the quest for security against privilege escalation attacks on android., , , , , and . ACM Conference on Computer and Communications Security, page 741-744. ACM, (2011)Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges., , , , and . CoRR, (2022)Performance Evaluation for a Post-Quantum Public-Key Cryptosystem., , , , , , and . IPCCC, page 1-7. IEEE, (2021)