Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Andreas Fitzek"'
Autor:
Peter Teufl, Andreas Fitzek, Stefan Kraxberger, Clemens Orthacker, Michaela Ferk, Daniel Hein
Publikováno v:
Security and Communication Networks. 9:389-419
Recent smartphone platforms based on new operating systems, such as iOS, Android, or Windows Phone, have been a huge success in recent years and open up many new opportunities. Unfortunately, 2011 also showed us that the new technologies and the priv
Publikováno v:
TrustCom/BigDataSE/ISPA (1)
Recent years have seen a flurry of activity in the area of efficient and secure file systems for cloud storage, and also in the area of memory protection for secure processors. Both scenarios use cryptographic methods for data protection. Here, we co
Publikováno v:
INDIN
Security by isolation is a longstanding, widely applied, and useful paradigm for achieving security goals such as data and code integrity, confidentiality, and availability. Security by isolation can be used to create Trusted Execution Environments.
Autor:
Peter Teufl, Andreas Fitzek, Daniel Hein, Thomas Zefferer, Alexander Marsalek, Alexander Oprisnik
Publikováno v:
PRISMS
The high usability of smartphones and tablets is embraced by consumers as well as the corporate and public sector. However, especially in the non-consumer area the factor security plays a decisive role for the platform-selection process. All of the c
Publikováno v:
Lecture Notes in Computer Science
12th International Conference on Electronic Government (EGOV)
12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.274-285, ⟨10.1007/978-3-642-40358-3_23⟩
Lecture Notes in Computer Science ISBN: 9783642403576
12th International Conference on Electronic Government (EGOV)
12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.274-285, ⟨10.1007/978-3-642-40358-3_23⟩
Lecture Notes in Computer Science ISBN: 9783642403576
Part 4: Adoption and Service Evaluation; International audience; Electronic signatures play an important role in e-Business and e-Government applications. In particular, electronic signatures fulfilling certain security requirements are legally equiv
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bd93c505c3f1f198ccdc00ca677f42d8
https://hal.inria.fr/hal-01490913/document
https://hal.inria.fr/hal-01490913/document
Publikováno v:
ACM Transactions on Privacy & Security; Jul2022, Vol. 25 Issue 4, p1-35, 35p
Autor:
ONWUZURIKE, LUCKY, MARICONTI, ENRICO, ANDRIOTIS, PANAGIOTIS, DE CRISTOFARO, EMILIANO, ROSS, GORDON, STRINGHINI, GIANLUCA
Publikováno v:
ACM Transactions on Privacy & Security; Apr2019, Vol. 22 Issue 2, p1-34, 34p
Publikováno v:
2015 Conference on Information Assurance & Cyber Security (CIACS); 1/1/2015, p44-49, 6p
Publikováno v:
2015 IEEE Trustcom/BigDataSE/ISPA; 2015, p222-229, 8p
Publikováno v:
2015 IEEE Trustcom/BigDataSE/ISPA; 2015, pv-xix, 15p