Ghassan Karame
Orcid: 0000-0002-2828-4071Affiliations:
- Ruhr University Bochum, Germany
According to our database1,
Ghassan Karame
authored at least 91 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
10
1
4
1
1
4
5
3
5
2
4
1
3
1
1
3
4
3
6
1
3
4
4
6
5
3
1
3
1
3
2
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Defying the Odds: Solana's Unexpected Resilience in Spite of the Security Challenges Faced by Developers.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Closing the Gap: Achieving Better Accuracy-Robustness Tradeoffs against Query-Based Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Proceedings of the Financial Cryptography and Data Security, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
IEEE Trans. Serv. Comput., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the IEEE Secure Development Conference, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the IEEE International Conference on Blockchain, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Monitoring Performance Metrics is not Enough to Detect Side-Channel Attacks on Intel SGX.
CoRR, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
IEEE Trans. Computers, 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
IACR Cryptol. ePrint Arch., 2018
CoRR, 2018
2017
IEEE Trans. Dependable Secur. Comput., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
ACM Trans. Inf. Syst. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
ACM Trans. Internet Techn., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the third workshop on Hot topics in software defined networking, 2014
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the 20th International Conference on World Wide Web, 2011
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
IEEE Trans. Mob. Comput., 2010
Proceedings of the Computer Security, 2010
2009
Facilitating human-centric service delivery using a pluggable service development framework.
Int. J. Ad Hoc Ubiquitous Comput., 2009
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
2008
SuperTrust - A Secure and Efficient Framework for Handling Trust in Super Peer Networks.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
Proceedings of the Multimodal Technologies for Perception of Humans, 2007
Proceedings of the Fourth IEEE International Conference on Advanced Video and Signal Based Surveillance, 2007