£89.50
Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity
£89.50
Compilation for Secure Multi-party Computation
Security Policy in System-on-Chip Designs
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
Continuing Arms Race
Fault Tolerant Architectures for Cryptography and Hardware Security
Model-Implementation Fidelity in Cyber Physical System Design
Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants
Mathematical Foundations for Side-Channel Analysis of Cryptographic Systems
Secure Detection and Control in Cyber-Physical Systems
Software Design for Resilient Computer Systems
Privately and Publicly Verifiable Computing Techniques
Advanced Techniques for Assertion-Based Verification in Hardware Designs Using Data Mining Algorithms