Go to Header
Go to Main Navigation
Go to Content
Go to Footer
Ohjeet
Kirjaudu sisään (ulkop. käyttäjät)
Kirjaudu sisään (JY-tunnus)
Saavutettavuus
English (GB)
Henkilöluettelo
>
Nezer Zaidenberg
Etusivu
Asiantuntijat
Organisaatiot
Hankkeet
Julkaisut
Tutkimusaineistot
Tutkimusaktiviteetit
Tieteenalat
Rahoitusohjelmat
Seurantakohteet
YSO-asiasanat
Nezer
Zaidenberg
Ei aktiivista nimitystä
Julkaisut ja muut tuotokset
2/3
Survey of cyber threats in air traffic control and aircraft communications systems
(
2018
)
Harison, Elad; et al.
;
A3
System for Executing Encrypted Native Programs
(
2017
)
Resh, Amit; et al.
;
A1
;
OA
Preventing execution of unauthorized native-code software
(
2016
)
Resh, Amit; et al.
;
D4
System for executing encrypted native programs
(
2016
)
Resh, Amit; et al.
;
D4
Remote Attestation of Software and Execution-Environment in Modern Machines
(
2015
)
Kiperberg, Michael; et al.
;
A4
Timing and Side Channel Attacks
(
2015
)
Zaidenberg, Nezer; et al.
;
A3
Trusted Computing and DRM
(
2015
)
Zaidenberg, Nezer; et al.
;
A3
In Kernel Implementation of RSA Routines
(
2014
)
Algawi, Asaf; et al.
;
A4
TrulyTrusted Operating System Environment
(
2014
)
Tamir, Evyatar; et al.
;
A4
Can keys be hidden inside the CPU on modern Windows host
(
2013
)
Resh, Amit; et al.
;
A4
Efficient remote authentication
(
2013
)
Kiperberg, Michael; et al.
;
A1
;
OA
Efficient remote authentication
(
2013
)
Kiperberg, Michael; et al.
;
A4
LgDb 2.0: Using Lguest for kernel profiling, code coverage and simulation
(
2013
)
Khen, Eviatar; et al.
;
A4
PPPC — peer-2-peer streaming and algorithm for creating spanning trees for peer-2-peer networks
(
2013
)
Averbuch, Amir; et al.
;
A3
Truly-Protect: An efficient VM-based software protection
(
2013
)
Averbuch, Amir; et al.
;
A1
Viimeisin päivitys 2024-17-04 klo 21:14