Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/trusted2015.bht:"
@inproceedings{DBLP:conf/ccs/Condra15, author = {Geremy Condra}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {A Plea for Incremental Work in IoT Security}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {39}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808424}, doi = {10.1145/2808414.2808424}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Condra15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Dijk15, author = {Marten van Dijk}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {Hardware Security and its Adversaries}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {1--2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808422}, doi = {10.1145/2808414.2808422}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Dijk15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MikityukPKFA15, author = {Alexandra Mikityuk and Stefan Pham and Stefan Kaiser and Oliver Friedrich and Stefan Arbanowski}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {Content Protection in {HTML5} {TV} Platforms: Towards Browser-agnostic {DRM} and Cloud {UI} Environments}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {43--52}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808416}, doi = {10.1145/2808414.2808416}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MikityukPKFA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NordholzVPJD15, author = {Jan Nordholz and Julian Vetter and Michael Peter and Matthias Junker{-}Petschick and Janis Danisevskis}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {XNPro: Low-Impact Hypervisor-Based Execution Prevention on {ARM}}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {55--64}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808415}, doi = {10.1145/2808414.2808415}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NordholzVPJD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchallerS015, author = {Andr{\'{e}} Schaller and Boris Skoric and Stefan Katzenbeisser}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {On the Systematic Drift of Physically Unclonable Functions Due to Aging}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {15--20}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808417}, doi = {10.1145/2808414.2808417}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchallerS015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ScheelT15, author = {Ryan A. Scheel and Akhilesh Tyagi}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {Characterizing Composite User-Device Touchscreen Physical Unclonable Functions (PUFs) for Mobile Device Authentication}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {3--13}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808418}, doi = {10.1145/2808414.2808418}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ScheelT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Szefer15, author = {Jakub Szefer}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {Leveraging Processor Performance Counters for Security and Performance}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {41}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808421}, doi = {10.1145/2808414.2808421}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Szefer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Weimerskirch15, author = {Andr{\'{e}} Weimerskirch}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {An Overview of Automotive Cybersecurity: Challenges and Solution Approaches}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {53}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808423}, doi = {10.1145/2808414.2808423}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Weimerskirch15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XieBS15, author = {Yang Xie and Chongxi Bao and Ankur Srivastava}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {Security-Aware Design Flow for 2.5D {IC} Technology}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {31--38}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808420}, doi = {10.1145/2808414.2808420}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XieBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YeTCE15, author = {Xin Ye and Mostafa Taha and Cong Chen and Thomas Eisenbarth}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {Faster Leakage Detection and Exploitation}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {21--29}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808419}, doi = {10.1145/2808414.2808419}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YeTCE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2015trusted, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414}, doi = {10.1145/2808414}, isbn = {978-1-4503-3828-8}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2015trusted.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.