TU Darmstadt / ULB / TUbiblio

Browsen nach Person

Ebene hoch
Gruppiere nach: Keine Gruppierung | Typ des Eintrags | Datum | Sprache
Anzahl der Einträge: 40.

Asokan, N. ; Nyman, Thomas ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems - Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018
[Artikel], (2018)

Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza :
Revisiting Context-Based Pairing in IoT.
In: 55th Design Automation Conference (DAC), 24.-29.06. 2018, San Francisco, CA, USA. Proceedings of the 55th Design Automation Conference (DAC) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Asokan, N. ; Miettinen, Markus :
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
[Online-Edition: http://www.sciencedirect.com/science/article/pii/S0140366418...]
In: Computer Communications ISSN 0140-3664
[Artikel], (2018) (Im Druck)

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Dang, Minh Hoang ; Asokan, N. ; Sadeghi, Ahmad-Reza :
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
[Online-Edition: http://arxiv.org/abs/1804.07474]
In: CoRR, abs/1804.07474
[Artikel], (2018)

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep :
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=832...]
In: IEEE Internet Computing p. 1. ISSN 1089-7801
[Artikel], (2018)

Asokan, N. ; Nguyen, Thien Duc ; Tarkoma, Sasu ; Toivonen, Juhani ; Truong, Hien Thi Thu :
Proximity Verification Based on Acoustic Room Impulse Response.
[Online-Edition: http://arxiv.org/abs/1803.07211]
In: CoRR, abs/1803.07211
[Artikel], (2018)

Liu, Jian ; Juuti, Mika ; Lu, Yao ; Asokan, N. :
Oblivious Neural Network Predictions via MiniONN Transformations.
In: ACM CCS 2017, ACM Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag], (2017)

Marchal, Samuel ; Armano, Giovanni ; Gröndahl, Tommi ; Saari, Kalle ; Singh, Nidhi ; Asokan, N. :
Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application.
In: IEEE Transactions on Computers , 66 (10)
[Konferenz- oder Workshop-Beitrag], (2017)

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny :
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (4) pp. 177-197.
[Artikel], (2017)

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Frassetto, Tommaso ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu :
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017) IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu :
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza :
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
54th Design Automation Conference (DAC'17)
[Konferenz- oder Workshop-Beitrag], (2017)

Asokan, N. ; Davi, Lucas ; Dessouky, Ghada ; Koeberl, Patrick ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza :
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
In: 54th Design Automation Conference (DAC'17).
[Konferenz- oder Workshop-Beitrag], (2017)

Tamrakar, Sandeep ; Liu, Jian ; Paverd, Andrew ; Ekberg, Jan-Erik ; Pinkas, Benny ; Asokan, N. :
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag], (2017)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
23rd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2016)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza :
Things, Trouble, Trust: On Building Trust in IoT Systems.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2016)

Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza :
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16)
[Konferenz- oder Workshop-Beitrag], (2016)

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA: Scalable Embedded Device Attestation.
22nd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2015)

Nyman, Thomas ; McGillion, Brian ; Asokan, N. :
On Making Emerging Trusted Execution Environments Accessible to Developers.
In: Lecture Notes in Computer Science , 9229 . Springer International Publishing
[Konferenz- oder Workshop-Beitrag], (2015)

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA - Technical Report.

[Report], (2015)

Nagy, Marcin ; Bui, Thanh Phong ; Cristofaro, Emiliano De ; Asokan, N. ; Ott, Jörg ; Sadeghi, Ahmad-Reza :
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
ACM WiSEC 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Miettinen, Markus ; Asokan, N. ; Koushanfar, Farinaz ; Nguyen, Thien Duc ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Sobhani, Majid ; Yellapantula, Sudha :
I know where you are: Proofs of Presence resilient to malicious provers.
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Konferenz- oder Workshop-Beitrag], (2015)

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep :
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
[Online-Edition: https://arxiv.org/pdf/1511.02119.pdf]
In: CoRR, abs/1511.02119
[Artikel], (2015)

Miettinen, Markus ; Asokan, N. ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Sobhani, Majid :
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
Proc. ACM Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8) pp. 1189-1206.
[Artikel], (2014)

Nyman, Thomas ; Ekberg, Jan-Erik ; Asokan, N. :
Citizen Electronic Identities using {TPM} 2.0.
In: CoRR, abs/1409.1023
[Artikel], (2014)

Ekberg, Jan-Erik ; Kostiainen, Kari ; Asokan, N. :
The Untapped Potential of Trusted Execution Environments on Mobile Devices.
In: Security Privacy, IEEE, 12 (4) pp. 29-37.
[Artikel], (2014)

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. :
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Lagerspetz, E. ; Truong, Hien Thi Thu ; Tarkoma, S. ; Asokan, N. :
MDoctor: A Mobile Malware Prognosis Application.
Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on
[Konferenz- oder Workshop-Beitrag], (2014)

Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, N. ; Sadeghi, Ahmad-Reza :
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
Annual Computer Security Applications Conference (ACSAC 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza:
Mobile Platform Security.
Synthesis Lectures on Information Security, Privacy, and Trust, 4 (3). Morgan & Claypool
[Buch], (2013)

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. :
ConXsense – Context Sensing for Adaptive Usable Access Control.

[Report], (2013)

Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus :
CrowdShare: Secure Mobile Resource Sharing.
11. International Conference on Applied Cryptography and Network Security (ACNS'13) Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Gupta, Aditi ; Miettinen, Markus ; Asokan, N. ; Nagy, Marcin :
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 International Confernece on Social Computing (SocialCom) IEEE
[Konferenz- oder Workshop-Beitrag], (2012)

Gupta, Aditi ; Miettinen, Markus ; Asokan, N. :
Using context-profiling to aid in access control decisions on mobile devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
[Konferenz- oder Workshop-Beitrag], (2011)

Kostiainen, Kari ; Dmitrienko, Alexandra ; Ekberg, Jan-Erik ; Sadeghi, Ahmad-Reza ; Asokan, N. :
Key Attestation from Trusted Execution Environments.
TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing
[Konferenz- oder Workshop-Beitrag], (2010)

Miettinen, Markus ; Asokan, N. :
Towards security policy decisions based on context profiling.
In: AISec '10 . ACM
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Stüble, André ; Wolf, Marko ; Asokan, N. :
Securing Peer-to-Peer Distributions for Mobile Devices.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008).
[Konferenz- oder Workshop-Beitrag], (2008)

Asokan, N. ; Gasmi, Yacine ; Sadeghi, Ahmad-Reza ; Stewin, Patrick ; Unger, Martin :
Beyond Secure Channels.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007). ACM Press
[Konferenz- oder Workshop-Beitrag], (2007)

Sadeghi, Ahmad-Reza ; Wolf, Christopher ; Stüble, Christian ; Asokan, N. ; Ekberg, Jan-Erik :
Enabling Fairer Digital Rights Management with Trusted Computing.
In: LNCS , 4779 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2007)

Diese Liste wurde am Sat Oct 20 04:01:47 2018 CEST generiert.