Author:
Irvine Cynthia E.,Levitt Karl
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Trebiz: Byzantine Fault Tolerance with Byzantine Merchants;Proceedings of the 38th Annual Computer Security Applications Conference;2022-12-05
2. Developing non-interactive MPC with trusted hardware for enhanced security;International Journal of Information Security;2022-03-07
3. Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective;Proceedings of the 8th International Conference on Information Systems Security and Privacy;2022
4. SoK: Cryptographic Confidentiality of Data on Mobile Devices;Proceedings on Privacy Enhancing Technologies;2021-11-20
5. Programmable Daisychaining of Microelectrodes to Secure Bioassay IP in MEDA Biochips;IEEE Transactions on Very Large Scale Integration (VLSI) Systems;2020-05