Author of the publication

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities.

, and . Secur. Commun. Networks, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities., and . Secur. Commun. Networks, (2019)ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 273-290. USENIX Association, (2018)LBM: A Security Framework for Peripherals within the Linux Kernel., , , , , and . IEEE Symposium on Security and Privacy, page 967-984. IEEE, (2019)A Hybrid Approach to Secure Function Evaluation using SGX., , , , , , , and . AsiaCCS, page 100-113. ACM, (2019)Explainable Black-Box Attacks Against Model-based Authentication., , , , and . CoRR, (2018)A Practical Intel SGX Setting for Linux Containers in the Cloud., , , , and . CODASPY, page 255-266. ACM, (2019)Privacy-Preserving Localization using Enclaves., , , , , , , and . UEMCON, page 269-278. IEEE, (2021)One-Time Programs Made Practical., , , , , , and . Financial Cryptography, volume 11598 of Lecture Notes in Computer Science, page 646-666. Springer, (2019)Privacy preserving localization using a distributed particle filtering protocol., , , , , and . MILCOM, page 835-840. IEEE, (2017)Brittle Features of Device Authentication., , , , , and . CODASPY, page 53-64. ACM, (2021)