CROSSING Publications

Additional Attributes

Type

Building Secure Defenses Against Code-Reuse Attacks

Lucas Davi, Ahmad-Reza Sadeghi
December 2015
Springer International Publishing
[Online-Edition: http://www.springer.com/en/book/9783319255446]
[Book]

Automated Software Diversity

Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz
In: Synthesis Lectures on Information Security, Privacy, and Trust, December 2015
Morgan & Claypool
[Book]

Detection and Forensics of Domains Hijacking

Andreas Borgwart, Spyros Boukoros, Haya Shulman, Michael Waidner, Carel van Royeen
In: IEEE Global Communications Conference, December 2015
IEEE
[Online-Edition: globecom2015.ieee-globecom.org/]
[Inproceedings]

Pulse-controlled quantum gate sequences on a strongly coupled qubit chain

Holger Frydrych, Michael Marthaler, Gernot Alber
In: Phys. Rev. A, American Physical Society, p. 10, December 2015
[Online-Edition: journals.aps.org/pra/pdf/10.1103/PhysRevA.92.062322]
[Article]

On the Optimality of Differential Fault Analyses on CLEFIA

Juliane Krämer, Ágnes Kiss, Anke Stüber
In: MACIS 2015 - Sixth International Conference on Mathematical Aspects of Computer and Information Sciences, p. 19, November 2015
Springer
[Online-Edition: macis2015.zib.de/]
[Inproceedings]

Learning With Errors in the Exponent

Özgür Dagdelen, Sebastian Gajek, Florian Göpfert
In: 18th International Conference on information Security and Cryptology (ICISC) 2015, November 2015
Springer
[Online-Edition: www.icisc.org/icisc15/asp/]
[Inproceedings]

Rating Decomposition with Conjoint Analysis and Machine Learning

Florian Volk, Nadine Trüschler, Max Mühlhäuser
In: CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, p. 36-41, November 2015
IARIA
[Online-Edition: www.iaria.org/conferences2015/CENTRIC15.html]
[Inproceedings]

Automated Synthesis of Optimized Circuits for Secure Computation

Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni
In: 22nd ACM Conference on Computer and Communications Security (CCS'15), October 2015
[Inproceedings]

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks

Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, Marco Negro, Mohaned Qunaibit, Ahmad-Reza Sadeghi
In: 22nd ACM Conference on Computer and Communications Security (CCS), October 2015
[Inproceedings]
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang