Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Praveen Kumar Pendyala"'
Autor:
Alexandra Dmitrienko, Stephan Heuser, Bradley Reaves, William Enck, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi, Patrick Traynor, Negar Kiyavash, Henry Carter
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2017, Iss 1, Pp 170-187 (2017)
The majority of people across the globe rely on telephony networks as their primary means of communication. As such, many of the most sensitive personal, corporate and government related communications pass through these systems every day. Unsurprisi
Autor:
Tommi Gröndahl, Andrew Paverd, Elizabeth Stobert, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi, Hoang Long Nguyen, Nadarajah Asokan, Thien Duc Nguyen, Sandeep Tamrakar
Two attractive features of cloud storage services are (1) the automatic synchronization of files between multiple devices and (2) the possibility of sharing files with other users. However, many users are concerned about the security and privacy of d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::97a25a5043b66b55d742449360cae89d
http://hdl.handle.net/10138/327063
http://hdl.handle.net/10138/327063
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662549698
Financial Cryptography
Financial Cryptography
Smart mobile devices process and store a vast amount of security- and privacy-sensitive data. To protect this data from malicious applications mobile operating systems, such as Android, adopt fine-grained access control architectures. However, relate
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::96d9dbad0d5a4da6cb3dda8f10ecf665
https://doi.org/10.1007/978-3-662-54970-4_15
https://doi.org/10.1007/978-3-662-54970-4_15
Autor:
Christian Wachsmann, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Joonho Kong, Praveen Kumar Pendyala
Publikováno v:
DAC
Software-based attestation schemes aim at proving the integrity of code and data residing on a platform to a verifying party. However, they do not bind the hardware characteristics to the attestation protocol and are vulnerable to impersonation attac