Search

Your search keyword '"Nunes, Ivan"' showing total 253 results

Search Constraints

Start Over You searched for: Author "Nunes, Ivan" Remove constraint Author: "Nunes, Ivan"
253 results on '"Nunes, Ivan"'

Search Results

1. TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems

2. SpecCFA: Enhancing Control Flow Attestation/Auditing via Application-Aware Sub-Path Speculation

3. SoK: Runtime Integrity

4. Towards Browser Controls to Protect Cookies from Malicious Extensions

5. Poisoning Prevention in Federated Learning and Differential Privacy via Stateful Proofs of Execution

6. Towards Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices

7. UCCA: A Verified Architecture for Compartmentalization of Untrusted Code Sections in Resource-Constrained Devices

8. DiCA: A Hardware-Software Co-Design for Differential Checkpointing in Intermittently Powered Devices

9. PARseL: Towards a Verified Root-of-Trust over seL4

10. ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation

11. ISC-FLAT: On the Conflict Between Control Flow Attestation and Real-Time Operations

12. Oblivious Extractors and Improved Security in Biometric-Based Authentication Systems

13. CASU: Compromise Avoidance via Secure Update for Low-end Embedded Systems

14. ASAP: Reconciling Asynchronous Real-Time Operations and Proofs of Execution in Simple Embedded Systems

15. Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA

16. DIALED: Data Integrity Attestation for Low-end Embedded Devices

17. GAROTA: Generalized Active Root-Of-Trust Architecture

18. Tiny-CFA: A Minimalistic Approach for Control-Flow Attestation Using Verified Proofs of Execution

19. On the Root of Trust Identification Problem

20. On the TOCTOU Problem in Remote Attestation

22. A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise

23. Nanni Moretti as filmmaker and character

24. Formally Verified Hardware/Software Co-Design for Remote Attestation

25. KRB-CCN: Lightweight Authentication & Access Control for Private Content-Centric Networks

26. GRM: Group Regularity Mobility Model

27. Among the world's smallest vertebrates: a new miniaturized flea-toad (Brachycephalidae) from the Atlantic rainforest.

29. GROUPS-NET: Group Meetings Aware Routing in Multi-Hop D2D Networks

30. Group Mobility: Detection, Tracking and Characterization

31. Untrusted Code Compartmentalization for Bare Metal Embedded Devices

33. Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication Systems

34. KRB-CCN: Lightweight Authentication and Access Control for Private Content-Centric Networks

36. Verifiable Integrity and Availability for Code and Execution in Simple Embedded Systems

37. Treefrog Diversity in the Neotropics: Phylogenetic Relationships of Scinaxini (Anura: Hylidae: Hylinae)

41. Toward Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices

45. Odontophrynus toledoi Moroti & Pedrozo & Severgnini & Augusto-Alves & Dena & Martins & Nunes & Muscat 2022, sp. nov

46. Reabilitação oral total implanto suportada através de cirurgia guiada digital : é hoje uma realidade?

47. CASU

48. CASU

Catalog

Books, media, physical & digital resources