Search Results - Sadeghi, Ahmad-Reza
- Showing 1 - 15 results of 15
-
1
Building secure defenses against code-reuse attacks / by Davi, Lucas, Sadeghi, Ahmad-Reza
Published 2015Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
2
Physically unclonable functions (PUFs) : applications, models, and future directions / by Wachsmann, Christian, 1981-, Sadeghi, Ahmad-Reza
Published 2015Call Number: Loading…Full Text (via Morgan & Claypool)
Located: Loading…
eBook -
3
Physically unclonable functions (PUFs) : applications, models, and future directions / by Wachsmann, Christian, 1981-, Sadeghi, Ahmad-Reza
Published 2015Call Number: Loading…Full Text (via Morgan & Claypool)
Located: Loading…
eBook -
4
Automated software diversity / by Larsen, Per, Brunthaler, Stefan, Davi, Lucas, Sadeghi, Ahmad-Reza, Franz, Michael
Published 2016Call Number: Loading…Full Text (via Morgan & Claypool)
Located: Loading…
eBook -
5
Mobile platform security / by Asokan, N., 1963-, Davi, Lucas, Dmitrienko, Alexandra, Heuser, Stephan, Kostiainen, Kari, Reshetova, Elena, Sadeghi, Ahmad-Reza
Published 2014Call Number: Loading…Full Text (via Morgan & Claypool)
Located: Loading…
eBook -
6
Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers /
Published 2013Other Authors: “…Sadeghi, Ahmad-Reza…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook -
7
Information hiding 11th international workshop ; revised selected papers, IH 2009, Darmstadt, Germany, June 8-10, 2009 /
Published 2009Other Authors: “…Sadeghi, Ahmad-Reza…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
8
Information hiding 11th international workshop ; revised selected papers, IH 2009, Darmstadt, Germany, June 8-10, 2009 /
Published 2009Other Authors: “…Sadeghi, Ahmad-Reza…”
Call Number: Loading…Full Text (via IEEE)
Located: Loading…
Electronic Conference Proceeding eBook -
9
Radio frequency identification : security and privacy issues : 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014 : revised selected papers /
Published 2014Other Authors: “…Sadeghi, Ahmad-Reza…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook -
10
Research in Cryptology.
Published 2008Other Authors: “…Sadeghi, Ahmad-Reza…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
11
Applied cryptography and network security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings /
Published 2016Other Authors: “…Sadeghi, Ahmad-Reza…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook -
12
Towards hardware-intrinsic security foundations and practice /
Published 2010Other Authors: “…Sadeghi, Ahmad-Reza…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic eBook -
13
Cryptology and network security 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012, proceedings /
Published 2012Other Authors: “…Sadeghi, Ahmad-Reza…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
14
Trusted computing, challenges and applications First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12,...
Published 2008Other Authors: “…Sadeghi, Ahmad-Reza…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
15
Trust and trustworthy computing Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings /
Published 2010Other Authors: “…Sadeghi, Ahmad-Reza…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook
Search Tools:
RSS Feed
–
Save Search
Related Subjects
Computer security
Data encryption (Computer science)
Security measures
Cryptography
Computer networks
Data structures (Computer science)
Cloud computing
Computer input-output equipment
Computer-aided software engineering
Internet
Mobile communication systems
Public key infrastructure (Computer security)
Radio frequency identification systems
Stochastic programming
Systems programming (Computer science)
User-centered system design