Author of the publication

A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices.

, , , , and . ISC, volume 8783 of Lecture Notes in Computer Science, page 542-554. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers., , , and . ARES, page 38:1-38:10. ACM, (2018)Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel., , , and . MoMM, page 147-156. ACM, (2014)CORMORANT: Ubiquitous Risk-Aware Multi-Modal Biometric Authentication across Mobile Devices., , , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (3): 85:1-85:23 (2019)Practical Delegatable Anonymous Credentials From Equivalence Class Signatures., , , and . IACR Cryptol. ePrint Arch., (2022)Optimizing Distributed Face Recognition Systems through Efficient Aggregation of Facial Embeddings., , , and . Adv. Artif. Intell. Mach. Learn., 3 (1): 693-711 (2023)Diversity in locked and unlocked mobile device usage., , , , and . UbiComp Adjunct, page 379-384. ACM, (2014)On the state of V3 onion services., , and . FOCI@SIGCOMM, page 50-56. ACM, (2021)Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices., , and . MoMM, page 249. ACM, (2013)The Android Platform Security Model., , , and . CoRR, (2019)Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage, , , and . Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, page 105-114. New York, NY, USA, Association for Computing Machinery (ACM), (2014)