Author of the publication

Trusted Virtual Domains - Design, Implementation and Lessons Learned.

, , , , , , , , , and . INTRUST, volume 6163 of Lecture Notes in Computer Science, page 156-179. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment., and . ICISSP, page 588-595. SciTePress, (2019)On the Security of a Two-Factor Authentication Scheme., and . WISTP, volume 6033 of Lecture Notes in Computer Science, page 245-252. Springer, (2010)An internet role-game for the laboratory of network security course., and . ITiCSE, page 240-244. ACM, (2008)Ensuring Application Integrity: A Survey on Techniques and Tools., and . IMIS, page 192-199. IEEE Computer Society, (2015)Reliable Voice-Based Transactions over VoIP Communications., , , and . IMIS, page 101-108. IEEE Computer Society, (2015)The Design and Implementation of a Transparent Cryptographic File System for UNIX., , , and . USENIX ATC, FREENIX Track, page 199-212. USENIX, (2001)The Dark Side of the Interconnection: Security and Privacy in the Web of Things., and . IMIS, page 205-212. IEEE Computer Society, (2015)Measuring the effectiveness of containerization to prevent power draining attacks., , and . M&N, page 1-6. IEEE, (2017)Flexible and robust Enterprise Right Management., , and . ISCC, page 1257-1262. IEEE Computer Society, (2016)Interoperability between Federated Authentication Systems., and . IMIS, page 493-498. IEEE Computer Society, (2014)