Jan-Erik Ekberg
Orcid: 0009-0007-5432-6128
According to our database1,
Jan-Erik Ekberg
authored at least 50 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Proceedings of the 17th European Workshop on Systems Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Proceedings of the 33rd Conference of Open Innovations Association, 2023
2022
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 31st Conference of Open Innovations Association, 2022
Proceedings of the EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021
2020
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 4th Workshop on System Software for Trusted Execution, 2019
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
2017
CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
2014
IEEE Secur. Priv., 2014
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014
2013
Securing Software Architectures for Trusted Processor Environments ; Programvarusystem för säkra processorarkitekturer.
PhD thesis, 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011
2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Information Security Technology for Applications, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Implementing an application-specific credential platform using late-launched mobile trusted module.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010
2009
External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing.
Proceedings of the Trusted Systems, First International Conference, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Trust in a small package: minimized MRTM software implementation for mobile secure environments.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009
2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
Proceedings of the Information Security, 10th International Conference, 2007
2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006