Author of the publication

Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices.

, , , , , , and . HealthSec, USENIX Association, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Privacy for Implantable Medical Devices., , , , and . IEEE Pervasive Computing, 7 (1): 30-39 (2008)Panel: RFID Security and Privacy.. Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, page 45. Springer, (2007)Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices., , , , , , and . HealthSec, USENIX Association, (2011)Reliable Physical Unclonable Functions Using Data Retention Voltage of SRAM Cells., , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 34 (6): 903-914 (2015)Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers., , and . IEEE Trans. Computers, 58 (9): 1198-1210 (2009)Web Cookies: Not Just a Privacy Risk., and . Commun. ACM, 44 (9): 120 (2001)Inside risks - Reducing risks of implantable medical devices.. Commun. ACM, 52 (6): 25-27 (2009)Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems., , , , , and . IEEE Symposium on Security and Privacy, page 1048-1062. IEEE Computer Society, (2018)Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage., , and . NDSS, The Internet Society, (2006)CCCP: Secure Remote Storage for Computational RFIDs., , , , and . USENIX Security Symposium, page 215-230. USENIX Association, (2009)