Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ACM CCS 2016 Interviews, Part 1., and . IEEE Secur. Priv., 15 (2): 88-91 (2017)SAFE: A Secure and Efficient Long-Term Distributed Storage System., , , , , , , and . SBC@AsiaCCS, page 8-13. ACM, (2020)CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems., , , , and . ICCAD, page 1-8. ACM, (2019)FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning., , , , and . FPL, page 271-276. IEEE, (2023)Invited: Security Beyond Bulk Silicon: Opportunities and Challenges of Emerging Devices., , , , , and . DAC, page 1-4. IEEE, (2021)HardScope: Hardening Embedded Systems Against Data-Oriented Attacks., , , , , , and . DAC, page 63. ACM, (2019)Obscured Asymmetric Crypto-Functions for Secured Identification., and . EST, page 71-76. IEEE Computer Society, (2014)ACM CCS 2016 Interviews, Part 2., and . IEEE Secur. Priv., 15 (3): 70-76 (2017)Hardware entangled security primitives: attacks and defenses.. Technical University of Darmstadt, Germany, (2022)FLAME: Taming Backdoors in Federated Learning., , , , , , , , , and 3 other author(s). USENIX Security Symposium, page 1415-1432. USENIX Association, (2022)