Author of the publication

Trusted Virtual Domains - Design, Implementation and Lessons Learned.

, , , , , , , , , and . INTRUST, volume 6163 of Lecture Notes in Computer Science, page 156-179. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Interoperability in Multi-domain Enterprise Right Management Applications., and . ICISSP (Revised Selected Papers), volume 1221 of Communications in Computer and Information Science, page 382-402. Springer, (2019)iToken: aWireless smart card reader which provides handhelds with desk top equivalent security., , , , and . SecureComm, page 98-106. IEEE, (2007)Securing Operating System Services Based on Smart Cards., , , and . TrustBus, volume 3592 of Lecture Notes in Computer Science, page 321-330. Springer, (2005)A honeypot system with honeyword-driven fake interactive sessions., , and . HPCS, page 187-194. IEEE, (2015)On the Security of a Two-Factor Authentication Scheme., and . WISTP, volume 6033 of Lecture Notes in Computer Science, page 245-252. Springer, (2010)A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment., and . ICISSP, page 588-595. SciTePress, (2019)An internet role-game for the laboratory of network security course., and . ITiCSE, page 240-244. ACM, (2008)Ensuring Application Integrity: A Survey on Techniques and Tools., and . IMIS, page 192-199. IEEE Computer Society, (2015)Reliable Voice-Based Transactions over VoIP Communications., , , and . IMIS, page 101-108. IEEE Computer Society, (2015)The Design and Implementation of a Transparent Cryptographic File System for UNIX., , , and . USENIX Annual Technical Conference, FREENIX Track, page 199-212. USENIX, (2001)