-
1Report
المؤلفون: Cheng, Pau-Chen, Ozga, Wojciech, Valdez, Enriquillo, Ahmed, Salman, Gu, Zhongshu, Jamjoom, Hani, Franke, Hubertus, Bottomley, James
URL الوصول: http://arxiv.org/abs/2303.15540
-
2Report
المؤلفون: Cheng, Pau-Chen, Eykholt, Kevin, Gu, Zhongshu, Jamjoom, Hani, Jayaram, K. R., Valdez, Enriquillo, Verma, Ashish
URL الوصول: http://arxiv.org/abs/2105.09400
-
3Academic Journal
المؤلفون: Cheng, Pau-Chen, Ozga, Wojciech, Valdez, Enriquillo, Ahmed, Salman, Gu, Zhongshu, Jamjoom, Hani, Franke, Hubertus, Bottomley, James
المصدر: ACM Computing Surveys; Sep2024, Vol. 56 Issue 9, p1-33, 33p
مصطلحات موضوعية: MESSAGE authentication codes, HYPERVISOR (Computer software), INSTRUCTION set architecture, ADVANCED Encryption Standard, PCI bus (Computer bus), COMPUTER firmware
-
4Conference
المؤلفون: Cheng, Pau-Chen, Eykholt, Kevin, Gu, Zhongshu, Jamjoom, Hani, Jayaram, K. R., Valdez, Enriquillo, Verma, Ashish
المصدر: Proceedings of the Nineteenth European Conference on Computer Systems
-
5
-
6Conference
المؤلفون: Hunt, Guerney D. H., Pai, Ramachandra, Le, Michael V., Jamjoom, Hani, Bhattiprolu, Sukadev, Boivie, Rick, Dufour, Laurent, Frey, Brad, Kapur, Mohit, Goldman, Kenneth A., Grimm, Ryan, Janakirman, Janani, Ludden, John M., Mackerras, Paul, May, Cathy, Palmer, Elaine R., Rao, Bharata Bhasker, Roy, Lawrence, Starke, William A., Stuecheli, Jeff, Valdez, Enriquillo, Voigt, Wendel
المصدر: Proceedings of the Sixteenth European Conference on Computer Systems
-
7Conference
المؤلفون: Cheng, Pau-Chen, Eykholt, Kevin, Gu, Zhongshu, Jamjoom, Hani, Jayaram, K. R., Valdez, Enriquillo, Verma, Ashish
المصدر: Proceedings of the First Workshop on Systems Challenges in Reliable and Secure Federated Learning
-
8
-
9Book
المؤلفون: Valdez, Enriquillo, Yung, Moti
المصدر: Lecture Notes in Computer Science ; Information Security ; page 125-143 ; ISSN 0302-9743 ; ISBN 9783540426622 9783540454397
-
10
-
11
-
12
-
13Conference
المؤلفون: Valdez, Enriquillo, Pendarakis, Dimitrios, Jamjoom, Hani
المصدر: 2019 IEEE International Congress on Internet of Things (ICIOT)
-
14
-
15Conference
المؤلفون: Berger, Stefan, Goldman, Kenneth, Pendarakis, Dimitrios, Safford, David, Valdez, Enriquillo, Zohar, Mimi
المصدر: 2015 IEEE International Conference on Cloud Engineering
-
16Book
المؤلفون: Valdez, Enriquillo, Yung, Moti
المصدر: Information Hiding ; Lecture Notes in Computer Science ; page 379-394 ; ISSN 0302-9743 1611-3349 ; ISBN 9783540671824 9783540465140
-
17Academic Journal
المؤلفون: Berger, Stefan, Cáceres, Ramón, Pendarakis, Dimitrios, Sailer, Reiner, Valdez, Enriquillo, Perez, Ronald, Schildhauer, Wayne, Srinivasan, Deepa
المصدر: ACM SIGOPS Operating Systems Review ; volume 42, issue 1, page 40-47 ; ISSN 0163-5980
-
18Book
المؤلفون: Pfitzmann, Andreas, Valdez, Enriquillo, Yung, Moti
المصدر: Information Hiding; 2000, p379-394, 16p
-
19Academic Journal
المؤلفون: Goldman, Kenneth, Valdez, Enriquillo
المصدر: IEEE Internet Computing; Nov/Dec2004, Vol. 8 Issue 6, p18-24, 7p, 2 Diagrams
مصطلحات موضوعية: NATIONAL security, COMPUTER security, SECURITY systems, DATABASE management, INTERNET servers, CRYPTOGRAPHY