Author of the publication

Comparing the effectiveness of commercial obfuscators against MATE attacks.

, , , , and . SSPREW@ACSAC, page 8:1-8:11. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks., , , and . IPCCC, page 469-474. IEEE Computer Society, (2008)Dynamic Architectural Countermeasure to Protect RSA against Side Channel Power Analysis Attacks., , and . ICISTM, volume 285 of Communications in Computer and Information Science, page 372-383. Springer, (2012)An FPGA Noise Resistant Digital Temperature Sensor with Auto Calibration., , and . ICISTM, volume 285 of Communications in Computer and Information Science, page 325-335. Springer, (2012)A Systems Approach to Cyber Assurance Education., and . InfoSecCD, page 13-19. ACM, (2013)Software Security and Randomization through Program Partitioning and Circuit Variation., , and . MTD@CCS, page 79-86. ACM, (2014)Formal Security Evaluation of Ad Hoc Routing Protocols. Florida State University, (2007)On the Credibility of MANET Simulations, and . IEEE Computer, (July 2006)SCADA Trust Management System., , , , and . Security and Management, page 548-554. CSREA Press, (2010)Enhanced Operating System Protection to Support Digital Forensic Investigations., , , , and . TrustCom/BigDataSE/ICESS, page 650-659. IEEE Computer Society, (2017)Utilizing the Cloud to Store Hijacked Camera Images., , , and . HICSS, page 5497-5506. IEEE Computer Society, (2016)