Author of the publication

Digital Trust - Trusted Computing and Beyond: A Position Paper.

, and . TrustCom, page 884-892. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks., , , , , and . CoRR, (2016)E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy., , and . CoRR, (2018)Firewall Mechanism in a User Centric Smart Card Ownership Model., , and . CARDIS, volume 6035 of Lecture Notes in Computer Science, page 118-132. Springer, (2010)Secure and Trusted Application Execution on Embedded Devices., , and . SECITC, volume 9522 of Lecture Notes in Computer Science, page 3-24. Springer, (2015)Rethinking the Smart Card Technology., and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 221-232. Springer, (2014)Ensuring Secure Application Execution and Platform-Specific Execution in Embedded Devices., , and . ACM Trans. Embed. Comput. Syst., 18 (3): 26:1-26:21 (2019)Location Based Application Availability., , and . OTM Workshops, volume 5872 of Lecture Notes in Computer Science, page 128-138. Springer, (2009)EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs., , and . WISTP, volume 10741 of Lecture Notes in Computer Science, page 75-92. Springer, (2017)The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions., , , , , , and . IEEE Symposium on Security and Privacy Workshops, page 179-188. IEEE Computer Society, (2017)Return-Oriented Programming on RISC-V., , , , , and . AsiaCCS, page 471-480. ACM, (2020)