The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for countermeasures with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1996 (15) 1997-1998 (15) 1999-2000 (17) 2001 (26) 2002 (38) 2003 (53) 2004 (74) 2005 (110) 2006 (118) 2007 (123) 2008 (125) 2009 (119) 2010 (51) 2011 (64) 2012 (80) 2013 (74) 2014 (87) 2015 (85) 2016 (78) 2017 (100) 2018 (128) 2019 (136) 2020 (165) 2021 (195) 2022 (156) 2023 (178) 2024 (36)
Publication types (Num. hits)
article(917) book(3) incollection(31) inproceedings(1433) phdthesis(62)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1065 occurrences of 522 keywords

Results
Found 2446 publication records. Showing 2446 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
92Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Spike attacks, Software countermeasures, Transient fault model, RSA, Chinese Remainder Theorem, Fault attacks, Hardware security, Bellcore attack
75Tal Malkin, François-Xavier Standaert, Moti Yung A Comparative Cost/Security Analysis of Fault Attack Countermeasures. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attacks and countermeasures in hardware and software
66Thomas Popp, Stefan Mangard, Elisabeth Oswald Power Analysis Attacks and Countermeasures. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DPA-resistant logic styles, countermeasures, power analysis attacks
57Takashi Hamaguchi, Kazuhiro Takeda, Yukiyasu Shimada, Yoshihiro Hashimoto Plant Model Generation for Countermeasures Planning. Search on Bibsonomy KES (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Alarm Management, Countermeasures Planning, CE-matrices
56Tai-Hoon Kim, Seung-youn Lee Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
56Stefan Mangard Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
53Philipp Grabher, Johann Großschädl, Dan Page Non-deterministic processors: FPGA-based analysis of area, performance and security. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF micro-architectural countermeasures, non-deterministic processors, side-channel attack, processor design
47Yannick Monnet, Marc Renaudin, Régis Leveugle, Nathalie Feyt, Pascal Moitrel, F. M'Buwa Nzenguet Practical Evaluation of Fault Countermeasures on an Asynchronous DES Crypto Processor. Search on Bibsonomy IOLTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Paul Heymann, Georgia Koutrika, Hector Garcia-Molina Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF social Web sites, spam countermeasures, social media, spam, resource sharing, social search
45Stefan Tillich, Christoph Herbst, Stefan Mangard Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software countermeasures, implementation security, Advanced Encryption Standard, side-channel attacks, DPA, power analysis, instruction set extensions
45Pierre-Alain Fouque, Frédéric Valette The Doubling Attack - Why Upwards Is Better than Downwards. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SPA-based analysis, DPA countermeasures, multiple exponent single data attack, scalar multiplication, modular exponentiation
40Tobias Hoppe, Stefan Kiltz, Jana Dittmann Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures. Search on Bibsonomy SAFECOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Practical tests, Exemplary threats and countermeasures, Safety, Automotive, IT-Security
40Stefan Tillich, Christoph Herbst Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF software countermeasures, operation randomization, advanced DPA attacks, smart card, Advanced Encryption Standard, side channel attacks, power analysis, masking
38Denis Réal, Cécile Canovas, Jessy Clédière, M'hamed Drissi, Frédéric Valette Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis. Search on Bibsonomy DATE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion
38Tae Hyun Kim 0003, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim 0001 Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Tai-Hoon Kim, Seung-youn Lee Design Procedure of IT Systems Security Countermeasures. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette Defeating Countermeasures Based on Randomized BSD Representations. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto Efficient Countermeasures against RPA, DPA, and SPA. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Elliptic curve exponentiation, ZPA, RPA, DPA, SPA
38Ryôichi Sasaki, Hiroshi Yoshiura, Shinji Itoh Combinatorial Optimization of Countermeasures against Illegal Copying. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
38M. Anwarul Hasan Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for Koblitz Curve Cryptosystems. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2001 DBLP  DOI  BibTeX  RDF elliptic curve scalar multiplication, finite (or Galois) fields, Cryptography, power analysis attacks, Koblitz curves, number system
38Michael Tunstall, Olivier Benoît Efficient Use of Random Delays in Embedded Software. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Smart card security, fault attack countermeasures, side channel attack countermeasures
36Shay Gueron Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF safe errors, RSA, smartcards, Fault attacks, countermeasures, embedded devices
36Mathieu Ciet, Christophe Giraud 0001 Transient Fault Induction Attacks on XTR. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF public-key system XTR, smart cards, countermeasures, Differential fault analysis
34Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund, Thomas Walter 0001 Breaking the memory secrecy assumption. Search on Bibsonomy EUROSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF buffer overread, probabilistic countermeasure, buffer overflow, systems security, bypass
34Emmanuelle Dottax, Christophe Giraud 0001, Matthieu Rivain, Yannick Sierra On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Second Order, CRT-RSA, Fault Attacks, Countermeasure
34Teodor Sommestad, Mathias Ekstedt, Pontus Johnson Combining Defense Graphs and Enterprise Architecture Models for Security Analysis. Search on Bibsonomy EDOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Emmanuel Prouff, Matthieu Rivain A Generic Method for Secure SBox Implementation. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Li-Chiou Chen, Kathleen M. Carley The impact of countermeasure propagation on the prevalence of computer viruses. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Dong-Guk Han, Tetsuya Izu, Jongin Lim 0001, Kouichi Sakurai Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao 0001 On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF packet interarrival times, traffic analysis attacks, statistical analysis, statistical pattern recognition
32Wei Liao, Tie-Ping Yan, Yijin Wu, Helena Ndakeva, Xuying Yuan A Study on the Status, Problems and Its Countermeasures of Soil Erosion in Hubei Province, China. Search on Bibsonomy ESIAT (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF the countermeasures, Hubei of China, protection, problem, soil erosion
32Thomas Dreibholz, Erwin P. Rathgeb, Xing Zhou On Robustness and Countermeasures of Reliable Server Pooling Systems Against Denial of Service Attacks. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Robustness, Denial of Service, Attacks, Countermeasures, Reliable Server Pooling
32Johannes Blömer, Volker Krummel Analysis of Countermeasures Against Access Driven Cache Attacks on AES. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF AES, countermeasures, threat model, random permutations, cache attacks
30Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos Treating scalability and modelling human countermeasures against local preference worms via gradient models. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Asmaa Adnane, Christophe Bidan, Rafael Timóteo de Sousa Júnior Trust-Based Countermeasures for Securing OLSR Protocol. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Marinho P. Barcellos, Daniel Bauermann, Henrique Sant'anna, Matheus B. Lehmann, Rodrigo B. Mansilha Protecting BitTorrent: Design and Evaluation of Effective Countermeasures against DoS Attacks. Search on Bibsonomy SRDS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Chong Hee Kim, Jean-Jacques Quisquater Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song Distributed Evasive Scan Techniques and Countermeasures. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF scan detection, distributed scanning, information-hiding, evasion
30Martin Boldt, Bengt Carlsson Analysing Countermeasures Against Privacy-Invasive Software. Search on Bibsonomy ICSEA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Michael McIntosh, Paula Austel XML signature element wrapping attacks and countermeasures. Search on Bibsonomy SWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security policy, attack, vulnerability, web services security, countermeasure, XML signature
30Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
30Ye Zhu 0001, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao 0001 On Flow Correlation Attacks and Countermeasures in Mix Networks. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao 0001, Dong Xuan Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks. Search on Bibsonomy ICPP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Artemios G. Voyiatzis, Dimitrios N. Serpanos Active hardware attacks and proactive countermeasures. Search on Bibsonomy ISCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30Kouichi Itoh, Jun Yajima, Masahiko Takenaka, Naoya Torii DPA Countermeasures by Improving the Window Method. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30Marc Girault, Jean-François Misarsky Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
30M. Anwarul Hasan Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28Yajuan Tang, Xiapu Luo, Rocky K. C. Chang Protecting Internet Services from Low-Rate DoS Attacks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF low-rate DoS attacks, detection, Feedback control, countermeasures
28Catherine H. Gebotys A split-mask countermeasure for low-energy secure embedded systems. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF EM analysis, Side channel analysis, countermeasures, power attacks
28Steven Cheung Denial of Service against the Domain Name System. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF denial of service, countermeasures, domain name system, threat analysis, network infrastructure
28Raphael C.-W. Phan, Sung-Ming Yen Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attacks and countermeasures in hardware and software, cryptanalysis, Advanced Encryption Standard, side-channel attacks, fault attacks
28Daniel Mesquita, Jean-Denis Techer, Lionel Torres, Gilles Sassatelli, Gaston Cambon, Michel Robert, Fernando Moraes 0001 Current mask generation: a transistor level security against DPA attacks. Search on Bibsonomy SBCCI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptography, side channel attacks, DPA, countermeasures
28Manuel Barbosa, Dan Page On the Automatic Construction of Indistinguishable Operations. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Indistinguishable Operations, Countermeasures, Simple Power Analysis, Side-channel Cryptanalysis
28Thomas Popp, Stefan Mangard Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Hardware Countermeasures, MDPL, Masking Logic, Dual-Rail Pre-Charge Logic, DPA, Side-Channel Analysis
28Marco Bucci, Michele Guglielmo, Raimondo Luzzi, Alessandro Trifiletti A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors. Search on Bibsonomy PATMOS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF chipcards, cryptography, Differential power analysis, DPA, power analysis, countermeasures
28Jovan Dj. Golic DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Keyed reversible circuits, data scrambling, probing attacks, block ciphers, power analysis, countermeasures
28Jovan Dj. Golic, Christophe Tymen Multiplicative Masking and Power Analysis of AES. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multiplicative masking, AES, differential power analysis, countermeasures
26Yue Wang 0001, Ran Tao 0003, Bing-Zhao Li 0001 Using the multi-living agent concept to investigate complex information systems. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF complex information system, multi-living-agent (MLA), self-organization mechanism, negotiation-coordination model, Swarm
26Simon N. Foley, William M. Fitzgerald An Approach to Security Policy Configuration Using Semantic Threat Graphs. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Xu Guo 0001, Junfeng Fan, Patrick Schaumont, Ingrid Verbauwhede Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Hua Wang, Yao Guo 0001, Xiangqun Chen DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Michele Colajanni, Daniele Gozzi, Mirco Marchetti Collaborative architecture for malware detection and analysis. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Nele Mentens, Benedikt Gierlichs, Ingrid Verbauwhede Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Attila Ondi, Richard Ford How good is good enough? Metrics for worm/anti-worm evaluation. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti Using CP-nets as a guide for countermeasure selection. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Chong Hee Kim, Jean-Jacques Quisquater How can we overcome both side channel analysis and fault attacks on RSA-CRT? Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Christophe Giraud 0001 An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Smart cards, RSA, fault injection, public-key cryptosystems, exponentiation, simple power analysis, side channel
26Douglas P. Twitchell Social engineering in information assurance curricula. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information security curriculum, social engineering
26Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes Measuring Resistance to Social Engineering. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Information security, Security metrics, Security testing, Vulnerability analysis, Social engineering
26Eun-Jung Choi, Hyung-Jong Kim, Myuhng Joo Kim DMKB : A Defense Mechanism Knowledge Base. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Srivaths Ravi 0001, Anand Raghunathan, Srimat T. Chakradhar Tamper Resistance Mechanisms for Secure, Embedded Systems. Search on Bibsonomy VLSI Design The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Louis Goubin A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards
26Chris Karlof, David A. Wagner 0001 Hidden Markov Model Cryptanalysis. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha Hardware Fault Attackon RSA with CRT Revisited. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis
26Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stéphane Tinguely Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF commercial and industrial security, COMP128, authentication, security protocols, side channel attacks, smartcards, GSM
25K. N. R. K. Raju Alluri, Anil Kumar Vuppala IIIT-H Spoofing Countermeasures for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2019. Search on Bibsonomy INTERSPEECH The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Huajun Huang, Shaohong Zhong, Junshan Tan Browser-Side Countermeasures for Deceptive Phishing Attack. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Andreas Westfeld Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Richard R. Brooks, Jing-En Pang, Christopher Griffin 0001 Game and Information Theory Analysis of Electronic Countermeasures in Pursuit-Evasion Games. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Peizhi Wang, Xinying Liu, Wenbo Li Analysis on Features and Countermeasures of Foreign-founded Enterprises' Sole Proprietorship in China. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF foreign direct investment, sole proprietorship, joint venture enterprise
21Wojciech Mostowski, Erik Poll Malicious Code on Java Card Smartcards: Attacks and Countermeasures. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Jonathan P. Caulkins, Eric D. Hough, Nancy R. Mead, Hassan Osman Optimizing Investments in Security Countermeasures: A Practical Tool for Fixed Budgets. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Carlos Cardillo, Michael Russo, Patricia LeDuc, William Torch Quantitative EEG Changes Under Continuous Wakefulness and with Fatigue Countermeasures: Implications for Sustaining Aviator Performance. Search on Bibsonomy HCI (16) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF QEEG, CNS, Epoch, Artifact, Brain Mapping
21Siyuan Liu, Chao Liu, Chunzhe Zhao, Yu Liu Mathematical Models and Optimization Discussion on EA System on AIDS/HIV Spread Estimating and Countermeasures Evaluating. Search on Bibsonomy BIBE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Heiko Mantel, Henning Sudbrock Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Kevin Eagles, Constantinos Markantonakis, Keith Mayes A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Smart Card Security, Security, Sensor Networks, RFID, Security Models, Ubiquitous Networks
21Wei Yu 0002, Nan Zhang 0004, Wei Zhao 0001 Self-adaptive Worms and Countermeasures. Search on Bibsonomy SSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Game theory, Worm
21ManKi Ahn, Hoon-Jae Lee 0001 Experiments and Hardware Countermeasures on Power Analysis Attacks. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SPA/DPA, Side Channel Attacks, Power Analysis, SmartCard, Countermeasure
21Dag Arne Osvik, Adi Shamir, Eran Tromer Cache Attacks and Countermeasures: The Case of AES. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache, cryptanalysis, AES, side-channel attack, memory access
21Daisuke Suzuki, Minoru Saeki Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21John Linn Technology and Web User Data Privacy: A Survey of Risks and Countermeasures. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, protocols, pseudonyms, rights management
21Mamoon Yunus, Rizwan Mallal An Empirical Study of Security Threats and Countermeasures in Web Services-Based Services Oriented Architectures. Search on Bibsonomy WISE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Feng Ouyang, Yunhe Li The actuality, questions and countermeasures of Electronic Commerce application in SMEs: a survey in the East of Guangdong Province, China. Search on Bibsonomy ICEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF EC application, the SMEs, EC
21Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, P. Sasikala, Seoung-Hyeon Lee, Jae-Kwang Lee Security Threats and Countermeasures in WLAN. Search on Bibsonomy AINTEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Youngsong Mun, Chungsoo Shin Secure Routing in Sensor Networks: Security Problem Analysis and Countermeasures. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Sang-ho Kim, Choon Seong Leem Security Threats and Their Countermeasures of Mobile Portable Computing Devices in Ubiquitous Computing Environments. Search on Bibsonomy ICCSA (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Mustapha Hedabou Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ?–adic method, precomputed table, Side Channel Attacks, Elliptic curve, scalar multiplication, Frobenius map
21Roberto Maria Avanzi Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Smart cards, Side-channel attacks, Public-key cryptography, Differential power analysis (DPA), Timing attacks, Hyperelliptic curves
21Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous Differential Power Analysis in the Presence of Hardware Countermeasures. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF hardware countermeasure, random process interrupt, smart card, Power analysis
Displaying result #1 - #100 of 2446 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license