Sadeghi, Ahmad-Reza.
Ahmad-Reza Sadeghi professeur en informatique
VIAF ID: 72467819 ( Personal )
Permalink: http://viaf.org/viaf/72467819
Preferred Forms
- 100 0 _ ‡a Ahmad-Reza Sadeghi ‡c professeur en informatique
-
- 100 1 _ ‡a Sadeghi, Ahmad-Reza
-
-
-
- 100 1 _ ‡a Sadeghi, Ahmad-Reza
- 100 1 _ ‡a Sadeghi, Ahmad-Reza
-
- 100 1 _ ‡a Sadeghi, Ahmad-Reza
- 100 1 _ ‡a Sadeghi, Ahmad-Reza
-
4xx's: Alternate Name Forms (3)
5xx's: Related Names (7)
- 510 2 _ ‡a Fraunhofer-Institut für Sichere Informationstechnologie ‡4 affi ‡4 https://d-nb.info/standards/elementset/gnd#affiliation ‡e Affiliation
- 510 2 _ ‡a Fraunhofer-Institut für Sichere Informationstechnologie
- 510 2 _ ‡a Ruhr-Universität Bochum ‡b Fakultät für Elektrotechnik und Informationstechnik ‡4 affi ‡4 https://d-nb.info/standards/elementset/gnd#affiliation ‡e Affiliation
- 510 2 _ ‡a Saarbrücken, University
- 510 2 _ ‡a Technische Universität Darmstadt ‡b Fachbereich Informatik ‡4 affi ‡4 https://d-nb.info/standards/elementset/gnd#affiliation ‡e Affiliation
- 510 2 _ ‡a Technische Universität Darmstadt ‡b Fachbereich Informatik
- 510 2 _ ‡a Universität Bochum ‡b Fakultät für Elektrotechnik und Informationstechnik
Works
Title | Sources |
---|---|
Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants | |
Beyond Mitigations: Fortschritte in Attack-Surface-Reduktion und -Analyse | |
Breaking Randomized Linear Generation Functions Based Virtual Password System | |
Building Secure Defenses Against Code-Reuse Attacks | |
CTL A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm | |
Enclave Computing Paradigm: Hardware-assisted Security Architectures & Applications | |
Enclave-Computing-Paradigma: Hardwaregestützte Sicherheitsarchitekturen und -anwendungen | |
Financial cryptography and data security 17th international conference ; revised selected papers | |
Flexible Hardware-based Security-aware Mechanisms and Architectures | |
Hardware entangled security primitives: attacks and defenses | |
HARDWAREUNTERSTÜTZTE SICHERHEITSPRIMITIVE: ANGRIFFE UND VERTEIDIGUNG | |
hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers | |
Information hiding : 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers | |
Location privacy in RFID-Systemen : neben vielen Vorteilen bringen RFID-Systeme Risiken hinsichtlich Sicherheit und Datenschutz mit sich | |
On the Security of PAS (Predicate-Based Authentication Service) | |
Radio Frequency Identification: Security and Privacy Issues : 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers | |
Raising The Bar: Advancing Mitigations Against Memory-Corruption and Side-Channel Attacks | |
Raising the Bar: Weiterentwicklung von Verteidigungen gegen Memory-Corruption- und Seitenkanal-Angriffe | |
Research in cryptology : Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, revised selected papers | |
Secure fingerprinting on sound foundations | |
Systemarchitekturdesigns für Sicheres, Flexibles und Offen Zugängliches Enklave-Computing. | |
Towards Hardware-Intrinsic Security Foundations and Practice | |
Trust and trustworthy computing : third international conference, TRUST 2010, Berlin, Germany, June 21-23, 2010 : proceedings | |
Trusted computing - challenges and applications, 2008: |