Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Stephan Heuser"'
Autor:
Alexandra Dmitrienko, Stephan Heuser, Bradley Reaves, William Enck, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi, Patrick Traynor, Negar Kiyavash, Henry Carter
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2017, Iss 1, Pp 170-187 (2017)
The majority of people across the globe rely on telephony networks as their primary means of communication. As such, many of the most sensitive personal, corporate and government related communications pass through these systems every day. Unsurprisi
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662549698
Financial Cryptography
Financial Cryptography
Smart mobile devices process and store a vast amount of security- and privacy-sensitive data. To protect this data from malicious applications mobile operating systems, such as Android, adopt fine-grained access control architectures. However, relate
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::96d9dbad0d5a4da6cb3dda8f10ecf665
https://doi.org/10.1007/978-3-662-54970-4_15
https://doi.org/10.1007/978-3-662-54970-4_15
Autor:
N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi
Publikováno v:
Synthesis Lectures on Information Security, Privacy, and Trust. 4:1-108
Autor:
N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious pa
Autor:
Marcos da Silva Ramos, Andre Rein, Stephan Heuser, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Thien Duc Nguyen
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662478530
Financial Cryptography
Financial Cryptography
Today, most smartphones feature different kinds of secure hardware, such as processor-based security extensions (e.g., TrustZone) and dedicated secure co-processors (e.g., SIM-cards or embedded secure elements). Unfortunately, secure hardware is almo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::317076cb2ebc76a221365aea0eea690a
https://doi.org/10.1007/978-3-662-47854-7_23
https://doi.org/10.1007/978-3-662-47854-7_23
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662478530
Financial Cryptography
Financial Cryptography
Today, cross-device communication and intelligent resource sharing among smart devices is limited and inflexible: Typically devices cooperate using fixed interfaces provided by custom-built applications, which users need to install manually. This is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::164f13c785eb94e0aff0e6e6678cf42b
https://doi.org/10.1007/978-3-662-47854-7_17
https://doi.org/10.1007/978-3-662-47854-7_17
Autor:
N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi
Publikováno v:
Synthesis Lectures on Information Security, Privacy, and Trust ISBN: 9783031012136
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5c20ca9e0cff44d8405fe1376af3aa26
https://doi.org/10.1007/978-3-031-02341-5_1
https://doi.org/10.1007/978-3-031-02341-5_1
Autor:
N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi
Publikováno v:
Synthesis Lectures on Information Security, Privacy, and Trust ISBN: 9783031012136
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8a2004acbe34f67a07cbad48bb020fbf
https://doi.org/10.1007/978-3-031-02341-5_5
https://doi.org/10.1007/978-3-031-02341-5_5
Autor:
N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi
Publikováno v:
Synthesis Lectures on Information Security, Privacy, and Trust ISBN: 9783031012136
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9f1faab096a5d5c3e2124b75bbc887c6
https://doi.org/10.1007/978-3-031-02341-5
https://doi.org/10.1007/978-3-031-02341-5
Autor:
N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi
Publikováno v:
Synthesis Lectures on Information Security, Privacy, and Trust ISBN: 9783031012136
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1769ad6a50bb7ce3299f85cac093596d
https://doi.org/10.1007/978-3-031-02341-5_6
https://doi.org/10.1007/978-3-031-02341-5_6