Zobrazeno 1 - 10
of 51
pro vyhledávání: '"Ginzboorg, Philip"'
Allowing a compromised device to receive privacy-sensitive sensor readings, or to operate a safety-critical actuator, carries significant risk. Usually, such risks are mitigated by validating the device's security state with remote attestation, but c
Externí odkaz:
http://arxiv.org/abs/2312.08903
Autor:
Ushakov, Vladimir, Sovio, Sampo, Qi, Qingchao, Nayani, Vijayanand, Manea, Valentin, Ginzboorg, Philip, Ekberg, Jan Erik
Publikováno v:
Proceedings of the 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Wuhan, China, 2022, pp. 1587-1596
The majority of mobile devices today are based on Arm architecture that supports the hosting of trusted applications in Trusted Execution Environment (TEE). RISC-V is a relatively new open-source instruction set architecture that was engineered to fi
Externí odkaz:
http://arxiv.org/abs/2211.10299
Publikováno v:
In Theoretical Computer Science 12 September 2024 1009
Publikováno v:
SSR 2018: Security Standardisation Research
3GPP Release 15, the first 5G standard, includes protection of user identity privacy against IMSI catchers. These protection mechanisms are based on public key encryption. Despite this protection, IMSI catching is still possible in LTE networks which
Externí odkaz:
http://arxiv.org/abs/1811.02293
Autor:
Ginzboorg, Philip
We are concerned with estimating alphabet size $N$ from a stream of symbols taken uniformly at random from that alphabet. We define and analyze a memory-restricted variant of an algorithm that have been earlier proposed for this purpose. The alphabet
Externí odkaz:
http://arxiv.org/abs/1711.07545
Publikováno v:
In Computer Communications 15 July 2014 48:84-97
Publikováno v:
In Computer Communications 1 February 2013 36(3):279-290
Autor:
Ginzboorg, Philip1 philip.ginzboorg@nokia.com
Publikováno v:
Communications of the ACM. Nov2000, Vol. 43 Issue 11, p89-92. 4p.
Publikováno v:
Computers (2073-431X); Jan2023, Vol. 12 Issue 1, p2, 41p
Publikováno v:
In Computer Communications 2010 33(1):2-10