-
1Report
المؤلفون: Fink, Martin, Stavrakakis, Dimitrios, Sprokholt, Dennis, Chakraborty, Soham, Ekberg, Jan-Erik, Bhatotia, Pramod
المصدر: 23rd ACM/IEEE International Symposium on Code Generation and Optimization (CGO '25), March 2025, Las Vegas, NV, USA
مصطلحات موضوعية: Computer Science - Programming Languages
URL الوصول: http://arxiv.org/abs/2408.11456
-
2Report
-
3Report
المؤلفون: Ushakov, Vladimir, Sovio, Sampo, Qi, Qingchao, Nayani, Vijayanand, Manea, Valentin, Ginzboorg, Philip, Ekberg, Jan Erik
المصدر: Proceedings of the 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Wuhan, China, 2022, pp. 1587-1596
مصطلحات موضوعية: Computer Science - Cryptography and Security, Computer Science - Hardware Architecture
URL الوصول: http://arxiv.org/abs/2211.10299
-
4Report
-
5
-
6Conference
المؤلفون: Moustafa, Mariam, Niemi, Arto, Ginzboorg, Philip, Ekberg, Jan Erik
المساهمون: Lenzini, Gabriele, Mori, Paolo, Furnell, Steven, Department of Computer Science, Huawei Technologies, Aalto-yliopisto, Aalto University
مصطلحات موضوعية: Device Security, Model Checking, Remote Attestation
وصف الملف: application/pdf
Relation: Proceedings of the 10th International Conference on Information Systems Security and Privacy; pp. 701-708; International Conference on Information Systems Security and Privacy; Volume 1; PURE LINK: http://www.scopus.com/inward/record.url?scp=85190856675&partnerID=8YFLogxK; PURE FILEURL: https://research.aalto.fi/files/155376665/SCI_Moustafa_etal_ICISSP_2024.pdf; https://aaltodoc.aalto.fi/handle/123456789/130445
-
7Report
-
8Report
-
9Report
المؤلفون: Liljestrand, Hans, Nyman, Thomas, Gunn, Lachlan J., Ekberg, Jan-Erik, Asokan, N.
مصطلحات موضوعية: Computer Science - Cryptography and Security
URL الوصول: http://arxiv.org/abs/1905.10242
-
10Report
المؤلفون: Liljestrand, Hans, Nyman, Thomas, Wang, Kui, Perez, Carlos Chinea, Ekberg, Jan-Erik, Asokan, N.
مصطلحات موضوعية: Computer Science - Cryptography and Security
URL الوصول: http://arxiv.org/abs/1811.09189
-
11
-
12Report
-
13Report
المؤلفون: Abera, Tigist, Asokan, N., Davi, Lucas, Ekberg, Jan-Erik, Nyman, Thomas, Paverd, Andrew, Sadeghi, Ahmad-Reza, Tsudik, Gene
مصطلحات موضوعية: Computer Science - Cryptography and Security
URL الوصول: http://arxiv.org/abs/1605.07763
-
14Academic Journal
المؤلفون: Fanti, Andrea, Chinea Perez, Carlos, Denis-Courmont, Remi, Roascio, Gianluca, Ekberg, Jan-Erik
المساهمون: Fanti, Andrea, Chinea Perez, Carlo, Denis-Courmont, Remi, Roascio, Gianluca, Ekberg, Jan-Erik
مصطلحات موضوعية: security, software security, memory safety, control-flow integrity, compiler, register spill, pointer authentication
وصف الملف: ELETTRONICO
Relation: info:eu-repo/semantics/altIdentifier/wos/WOS:000877295000020; volume:41; issue:11; firstpage:3757; lastpage:3766; numberofpages:10; journal:IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS; http://hdl.handle.net/11583/2970632; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85136069546; https://ieeexplore.ieee.org/document/9852762
-
15Report
المؤلفون: Nyman, Thomas, Ekberg, Jan-Erik, Asokan, N.
مصطلحات موضوعية: Computer Science - Cryptography and Security, K.6.5
URL الوصول: http://arxiv.org/abs/1409.1023
-
16Conference
المؤلفون: Wang, Kui, Kasatkin, Dmitry, Ahlrichs, Vincent, Auer, Lukas, Hohentanner, Konrad, Horsch, Julian, Ekberg, Jan-Erik
المصدر: Proceedings of the 17th European Workshop on Systems Security
-
17Conference
المؤلفون: Ott, Simon, Orthen, Benjamin, Weidinger, Alexander, Horsch, Julian, Nayani, Vijayanand, Ekberg, Jan-Erik
المصدر: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security
-
18Electronic Resource
المؤلفون: Moustafa., Mariam, Niemi., Arto, Ginzboorg., Philip, Ekberg., Jan-Erik
المصدر: Moustafa. , M , Niemi. , A , Ginzboorg. , P & Ekberg. , J-E 2024 , Attestation with Constrained Relying Party . in Proceedings of the 10th International Conference on Information Systems Security and Privacy - ICISSP . vol. 1 , SCITEPRESS Digital Library , pp. 701-708 , 10th International Conference on Information Systems Security and Privacy , Rome , Italy , 26/02/2024 .
مصطلحات الفهرس: Remote Attestation, Device Security, Model Checking, contributionToPeriodical
-
19Academic Journal
المؤلفون: Liljestrand, Hans, Ekberg, Jan-Erik
المصدر: IEEE Security & Privacy ; volume 22, issue 4, page 97-100 ; ISSN 1540-7993 1558-4046
-
20