Author of the publication

Measuring the effectiveness of containerization to prevent power draining attacks.

, , and . M&N, page 1-6. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

iToken: aWireless smart card reader which provides handhelds with desk top equivalent security., , , , and . SecureComm, page 98-106. IEEE, (2007)Off-line enterprise rights management leveraging biometric key binding and secure hardware., , and . J. Ambient Intell. Humaniz. Comput., 10 (7): 2883-2894 (2019)Improving Interoperability in Multi-domain Enterprise Right Management Applications., and . ICISSP (Revised Selected Papers), volume 1221 of Communications in Computer and Information Science, page 382-402. Springer, (2019)A honeypot system with honeyword-driven fake interactive sessions., , and . HPCS, page 187-194. IEEE, (2015)Securing Operating System Services Based on Smart Cards., , , and . TrustBus, volume 3592 of Lecture Notes in Computer Science, page 321-330. Springer, (2005)Reliable accounting in grids., , , and . IJHPCN, 7 (3): 186-194 (2013)Secure Dependency Enforcement in Package Management Systems., , and . IEEE Trans. Dependable Secur. Comput., 17 (2): 377-390 (2020)On the Security of a Two-Factor Authentication Scheme., and . WISTP, volume 6033 of Lecture Notes in Computer Science, page 245-252. Springer, (2010)A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment., and . ICISSP, page 588-595. SciTePress, (2019)An internet role-game for the laboratory of network security course., and . ITiCSE, page 240-244. ACM, (2008)