|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 45 publication records. Showing 45 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Flavio D. Garcia |
Automotive Cyber Security: Lessons Learned and Research Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018, pp. 19, 2018, ACM, 978-1-4503-6374-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Luciano Bozzi, Lorenzo Di Giuseppe, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci, Walter Tiberti |
TinyWIDS: a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018, pp. 13-16, 2018, ACM, 978-1-4503-6374-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Felipe Valencia, Tobias Oder, Tim Güneysu, Francesco Regazzoni 0001 |
Exploring the Vulnerability of R-LWE Encryption to Fault Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018, pp. 7-12, 2018, ACM, 978-1-4503-6374-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Di Federico |
rev.ng: A Tale of Reverse Engineering, Dynamic Analysis and Translation of Binaries Using QEMU and LLVM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018, pp. 20, 2018, ACM, 978-1-4503-6374-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Damien Couroussé, Thierno Barry, Bruno Robisson, Nicolas Belleville, Philippe Jaillon, Olivier Potin, Hélène Le Bouder, Jean-Louis Lanet, Karine Heydemann |
All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018, pp. 17-18, 2018, ACM, 978-1-4503-6374-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Halil Kemal Taskin, Murat Cenk |
Speeding up Curve25519 using Toeplitz Matrix-vector Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018, pp. 1-6, 2018, ACM, 978-1-4503-6374-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | John Goodacre, Mikel Luján, Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi (eds.) |
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![ACM, 978-1-4503-6374-7 The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hermann Seuschek, Fabrizio De Santis, Oscar M. Guillen |
Side-channel leakage aware instruction scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24, 2017, pp. 7-12, 2017, ACM, 978-1-4503-4869-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Karim M. Abdellatif, Damien Couroussé, Olivier Potin, Philippe Jaillon |
Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24, 2017, pp. 29-32, 2017, ACM, 978-1-4503-4869-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sha Tao, Elena Dubrova |
Reliable low-overhead arbiter-based physical unclonable functions for resource-constrained IoT devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24, 2017, pp. 1-6, 2017, ACM, 978-1-4503-4869-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Florian Wilde |
Large scale characterization of SRAM on infineon XMC microcontrollers as PUF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24, 2017, pp. 13-18, 2017, ACM, 978-1-4503-4869-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Frank K. Gürkaynak, Robert Schilling, Michael Muehlberghuber, Francesco Conti 0001, Stefan Mangard, Luca Benini |
Multi-core data analytics SoC with a flexible 1.76 Gbit/s AES-XTS cryptographic accelerator in 65 nm CMOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24, 2017, pp. 19-24, 2017, ACM, 978-1-4503-4869-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Miraje Gentilal, Paulo Martins 0002, Leonel Sousa |
TrustZone-backed bitcoin wallet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24, 2017, pp. 25-28, 2017, ACM, 978-1-4503-4869-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mats Brorsson, Zhonghai Lu, Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi (eds.) |
Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24, 2017 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![ACM, 978-1-4503-4869-0 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sandhya Koteshwara, Chris H. Kim, Keshab K. Parhi |
Mode-based Obfuscation using Control-Flow Modifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016, pp. 19-24, 2016, ACM, 978-1-4503-4065-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Venu Nalla, Rajeev Anand Sahu, Vishal Saraswat |
Differential Fault Attack on SIMECK. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016, pp. 45-48, 2016, ACM, 978-1-4503-4065-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Apostolos P. Fournaris, Nicolas Sklavos 0001, Christos Koulamas |
A High Speed Scalar Multiplier for Binary Edwards Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016, pp. 41-44, 2016, ACM, 978-1-4503-4065-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Thierno Barry, Damien Couroussé, Bruno Robisson |
Compilation of a Countermeasure Against Instruction-Skip Fault Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016, pp. 1-6, 2016, ACM, 978-1-4503-4065-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Noemie Beringuier-Boher, Marc Lacruche, David El-Baze, Jean-Max Dutertre, Jean-Baptiste Rigaud, Philippe Maurine |
Body Biasing Injection Attacks in Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016, pp. 49-54, 2016, ACM, 978-1-4503-4065-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed Saeed 0003, Ali Ahmadinia, Mike Just |
Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016, pp. 31-36, 2016, ACM, 978-1-4503-4065-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Karim M. Abdellatif, Roselyne Chotin-Avot, Habib Mehrez |
AEGIS-Based Efficient Solution for Secure Reconfiguration of FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016, pp. 37-40, 2016, ACM, 978-1-4503-4065-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hermann Seuschek, Johann Heyszl, Fabrizio De Santis |
A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016, pp. 7-12, 2016, ACM, 978-1-4503-4065-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Reza Azarderakhsh, Koray Karabina |
Efficient Algorithms and Architectures for Double Point Multiplication on Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016, pp. 25-30, 2016, ACM, 978-1-4503-4065-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vincent Immler, Maxim Hennig, Ludwig Kürzinger, Georg Sigl |
Practical Aspects of Quantization and Tamper-Sensitivity for Physically Obfuscated Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016, pp. 13-18, 2016, ACM, 978-1-4503-4065-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Martin Palkovic, Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi (eds.) |
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![ACM, 978-1-4503-4065-6 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mathieu Carbone, Yannick Teglia, Philippe Maurine, Gilles R. Ducharme |
Interest of MIA in frequency domain? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015, pp. 35-38, 2015, ACM, 978-1-4503-3187-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohsen Toorani |
On Continuous After-the-Fact Leakage-Resilient Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015, pp. 31-34, 2015, ACM, 978-1-4503-3187-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Herrmann, Marc Stöttinger |
Evaluation Tools for Multivariate Side-Channel Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015, pp. 1-6, 2015, ACM, 978-1-4503-3187-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Andy D. Pimentel, Stephan Wong, Gerardo Pelosi, Israel Koren, Giovanni Agosta, Alessandro Barenghi (eds.) |
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![ACM, 978-1-4503-3187-6 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Rainer Plaga, Dominik Merli |
A new Definition and Classification of Physical Unclonable Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015, pp. 7-12, 2015, ACM, 978-1-4503-3187-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Apostolos P. Fournaris, Nicolaos Klaoudatos, Nicolas Sklavos 0001, Christos Koulamas |
Fault and Power Analysis Attack Resistant RNS based Edwards Curve Point Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015, pp. 43-46, 2015, ACM, 978-1-4503-3187-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Paulo Martins 0002, Leonel Sousa |
Stretching the limits of Programmable Embedded Devices for Public-key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015, pp. 19-24, 2015, ACM, 978-1-4503-3187-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Loïc Zussa, Ingrid Exurville, Jean-Max Dutertre, Jean-Baptiste Rigaud, Bruno Robisson, Assia Tria, Jessy Clédière |
Evidence of an information leakage between logically independent blocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015, pp. 25-30, 2015, ACM, 978-1-4503-3187-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Harris E. Michail, Lenos Ioannou, Artemios G. Voyiatzis |
Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015, pp. 13-18, 2015, ACM, 978-1-4503-3187-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wei He, Alexander Herrmann |
Placement Security Analysis for Side-Channel Resistant Dual-Rail Scheme in FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015, pp. 39-42, 2015, ACM, 978-1-4503-3187-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael Lackner, Reinhard Berlach, Reinhold Weiss, Christian Steger |
Countering type confusion and buffer overflow attacks on Java smart cards by data type sensitive obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014, pp. 19-24, 2014, ACM, 978-1-4503-2484-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Raphael Spreitzer, Jörn-Marc Schmidt |
Group-signature schemes on constrained devices: the gap between theory and practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014, pp. 31-36, 2014, ACM, 978-1-4503-2484-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Vishal Saraswat, Daniel Feldman, Denis Foo Kune, Satyajit Das |
Remote cache-timing attacks against AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014, pp. 45-48, 2014, ACM, 978-1-4503-2484-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jens Knoop, Valentina Salapura, Israel Koren, Gerardo Pelosi (eds.) |
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![ACM, 978-1-4503-2484-7 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Youssef Souissi |
High-order timing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014, pp. 7-12, 2014, ACM, 978-1-4503-2484-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Pierre Schnarz, Joachim Wietzke, Ingo Stengel |
Towards attacks on restricted memory areas through co-processors in embedded multi-OS environments via malicious firmware injection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014, pp. 25-30, 2014, ACM, 978-1-4503-2484-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Stjepan Picek, Baris Ege, Lejla Batina, Domagoj Jakobovic, Lukasz Chmielewski, Marin Golub |
On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014, pp. 13-18, 2014, ACM, 978-1-4503-2484-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Robert M. Seepers, Christos Strydis, Ioannis Sourdis, Chris I. De Zeeuw |
Adaptive entity-identifier generation for IMD emergency access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014, pp. 41-44, 2014, ACM, 978-1-4503-2484-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kamil Gomina, Philippe Gendrier, Philippe Candelier, Jean-Baptiste Rigaud, Assia Tria |
Detecting positive voltage attacks on CMOS circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014, pp. 1-6, 2014, ACM, 978-1-4503-2484-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Reinhard Berlach, Michael Lackner, Christian Steger, Johannes Loinig, Ernst Haselsteiner |
Memory-efficient on-card byte code verification for Java cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CS2@HiPEAC ![In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014, pp. 37-40, 2014, ACM, 978-1-4503-2484-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #45 of 45 (100 per page; Change: )
|
|