Sam Kerr

According to our database1, Sam Kerr authored at least 11 papers between 2008 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
Cryptographic Key Management for Smart Power Grids - Approaches and Issues
CoRR, 2012

Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Marlin: making it harder to fish for gadgets.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Enforcing physically restricted access control for remote data.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

PUF ROKs: a hardware approach to read-once keys.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
PEAR: a hardware based protocol authentication system.
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2010

PUF ROKs: generating read-once keys from physically unclonable functions.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices.
J. Softw., 2009

Privacy-preserving management of transactions' receipts for mobile environments.
Proceedings of the IDtrust 2009, 2009

2008
VeryIDX - A Digital Identity Management System for Pervasive Computing Environments.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2008


  Loading...