DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3
zadetkov: 25
1.
  • Hardware-Based Trusted Comp... Hardware-Based Trusted Computing Architectures for Isolation and Attestation
    Maene, Pieter; Gotzfried, Johannes; de Clercq, Ruan ... IEEE transactions on computers, 03/2018, Letnik: 67, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Attackers target many different types of computer systems in use today, exploiting software vulnerabilities to take over the device and make it act maliciously. Reports of numerous attacks have been ...
Celotno besedilo
Dostopno za: UL

PDF
2.
  • I-BEAT: Ultrasonic method f... I-BEAT: Ultrasonic method for online measurement of the energy distribution of a single ion bunch
    Haffa, Daniel; Yang, Rong; Bin, Jianhui ... Scientific reports, 04/2019, Letnik: 9, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The shape of a wave carries all information about the spatial and temporal structure of its source, given that the medium and its properties are known. Most modern imaging methods seek to utilize ...
Celotno besedilo
Dostopno za: UL

PDF
3.
  • Multipass laser cavity for ... Multipass laser cavity for efficient transverse illumination of an elongated volume
    Vogelsang, Jan; Diepold, Marc; Antognini, Aldo ... Optics express, 06/2014, Letnik: 22, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    A multipass laser cavity is presented which can be used to illuminate an elongated volume from a transverse direction. The illuminated volume can also have a very large transverse cross section. ...
Celotno besedilo
Dostopno za: UL

PDF
4.
  • SOFIA: Software and control... SOFIA: Software and control flow integrity architecture
    de Clercq, Ruan; Götzfried, Johannes; Übler, David ... Computers & security, July 2017, 2017-07-00, Letnik: 68
    Journal Article
    Recenzirano
    Odprti dostop

    Software components are frequently used in cyber-physical systems (CPSes) to control a physical mechanism, such as a valve or brakes on a car. These systems are extremely sensitive to software ...
Celotno besedilo
Dostopno za: UL

PDF
5.
  • Sancus 2.0 Sancus 2.0
    Noorman, Job; Bulck, Jo Van; Mühlberg, Jan Tobias ... ACM transactions on privacy and security, 08/2017, Letnik: 20, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    The Sancus security architecture for networked embedded devices was proposed in 2013 at the USENIX Security conference. It supports remote (even third-party) software installation on devices while ...
Celotno besedilo
Dostopno za: UL

PDF
6.
  • ARMORED: CPU-Bound Encryption for Android-Driven ARM Devices
    Gotzfried, Johannes; Muller, Tilo 2013 International Conference on Availability, Reliability and Security, 2013-Sept.
    Conference Proceeding

    As recently shown by attacks against Android-driven smart phones, ARM devices are vulnerable to cold boot attacks. At the end of 2012, the data recovery tool FROST was released which exploits the ...
Celotno besedilo
Dostopno za: UL
7.
  • TEEshift TEEshift
    Lazard, Titouan; Götzfried, Johannes; Müller, Tilo ... Proceedings of the 3rd Workshop on System Software for Trusted Execution, 01/2018
    Conference Proceeding

    We present TEEshift, a tool suite that protects the confiden- tiality and integrity of code by shifting selected functions into TEEs. Our approach works entirely on binary-level and does not require ...
Celotno besedilo
Dostopno za: UL
8.
Celotno besedilo

PDF
9.
Celotno besedilo
Dostopno za: UL

PDF
10.
  • Mutual Authentication and T... Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption
    Gotzfried, Johannes; Mueller, Tilo ACM transactions on information and system security, 11/2014, Letnik: 17, Številka: 2
    Journal Article

    The weakest link in software-based full disk encryption is the authentication procedure. Since the master boot record must be present unencrypted in order to launch the decryption of remaining system ...
Celotno besedilo
Dostopno za: UL
1 2 3
zadetkov: 25

Nalaganje filtrov