The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "TrustED@CCS"( http://dblp.L3S.de/Venues/TrustED@CCS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ccs

Publication years (Num. hits)
2013 (10) 2014 (11) 2015 (11) 2016 (10)
Publication types (Num. hits)
inproceedings(38) proceedings(4)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 42 publication records. Showing 42 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1David F. Oswald Wireless Attacks on Automotive Remote Keyless Entry Systems. Search on Bibsonomy TrustED@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marcel Medwed IoT Security Challenges and Ways Forward. Search on Bibsonomy TrustED@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Naoya Torii, Dai Yamamoto, Tsutomu Matsumoto Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs. Search on Bibsonomy TrustED@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ethan Gaebel, Ning Zhang 0017, Wenjing Lou, Y. Thomas Hou 0001 Looks Good To Me: Authentication for Augmented Reality. Search on Bibsonomy TrustED@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andrei Costin Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations. Search on Bibsonomy TrustED@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aurélien Francillon Analyzing Thousands of Firmware Images and a Few Physical Devices: What's Next? Search on Bibsonomy TrustED@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Edgar R. Weippl, Stefan Katzenbeisser 0001, Mathias Payer, Stefan Mangard, Xinxin Fan, Tim Güneysu (eds.) Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016 Search on Bibsonomy TrustED@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christopher Huth, René Guillaume, Paul Duplys, Kumaragurubaran Velmurugan, Tim Güneysu On the Energy Cost of Channel Based Key Agreement. Search on Bibsonomy TrustED@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matthias Hiller, Aysun Gurur Önalan, Georg Sigl, Martin Bossert Online Reliability Testing for PUF Key Derivation. Search on Bibsonomy TrustED@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Markus Dürmuth, David F. Oswald, Niklas Pastewka Side-Channel Attacks on Fingerprint Matching Algorithms. Search on Bibsonomy TrustED@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jan Nordholz, Julian Vetter, Michael Peter, Matthias Junker-Petschick, Janis Danisevskis XNPro: Low-Impact Hypervisor-Based Execution Prevention on ARM. Search on Bibsonomy TrustED@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alexandra Mikityuk, Stefan Pham, Stefan Kaiser, Oliver Friedrich, Stefan Arbanowski Content Protection in HTML5 TV Platforms: Towards Browser-agnostic DRM and Cloud UI Environments. Search on Bibsonomy TrustED@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Indrajit Ray, Xiaofeng Wang, Kui Ren 0001 (eds.) Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015 Search on Bibsonomy TrustED@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1André Schaller, Boris Skoric, Stefan Katzenbeisser 0001 On the Systematic Drift of Physically Unclonable Functions Due to Aging. Search on Bibsonomy TrustED@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yang Xie, Chongxi Bao, Ankur Srivastava 0001 Security-Aware Design Flow for 2.5D IC Technology. Search on Bibsonomy TrustED@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jakub Szefer Leveraging Processor Performance Counters for Security and Performance. Search on Bibsonomy TrustED@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marten van Dijk Hardware Security and its Adversaries. Search on Bibsonomy TrustED@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1André Weimerskirch An Overview of Automotive Cybersecurity: Challenges and Solution Approaches. Search on Bibsonomy TrustED@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ryan A. Scheel, Akhilesh Tyagi Characterizing Composite User-Device Touchscreen Physical Unclonable Functions (PUFs) for Mobile Device Authentication. Search on Bibsonomy TrustED@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xin Ye 0002, Mostafa Taha, Cong Chen, Thomas Eisenbarth 0001 Faster Leakage Detection and Exploitation. Search on Bibsonomy TrustED@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Geremy Condra A Plea for Incremental Work in IoT Security. Search on Bibsonomy TrustED@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ahmad-Reza Sadeghi, Lucas Davi Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks. Search on Bibsonomy TrustED@CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Thomas Nyman, Jan-Erik Ekberg, N. Asokan Citizen Electronic Identities using TPM 2.0. Search on Bibsonomy TrustED@CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng Providing Root of Trust for ARM TrustZone using On-Chip SRAM. Search on Bibsonomy TrustED@CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Konrad-Felix Krentz, Gerhard Wunder 6LoWPAN Security: Avoiding Hidden Wormholes using Channel Reciprocity. Search on Bibsonomy TrustED@CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chongxi Bao, Ankur Srivastava 0001 A Secure Algorithm for Task Scheduling against Side-channel Attacks. Search on Bibsonomy TrustED@CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Markku-Juhani Olavi Saarinen Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor. Search on Bibsonomy TrustED@CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yier Jin Embedded System Security in Smart Consumer Electronics. Search on Bibsonomy TrustED@CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gene Tsudik Challenges in Remote Attestation of Low-End Embedded Devices. Search on Bibsonomy TrustED@CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christof Paar How to Build Hardware Trojans. Search on Bibsonomy TrustED@CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tiffany Hyun-Jin Kim Challenges of Establishing Trust in Online Entities and Beyond. Search on Bibsonomy TrustED@CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gail-Joon Ahn, Frederik Armknecht, Jorge Guajardo (eds.) Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014 Search on Bibsonomy TrustED@CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Sanjay K. Jha Securing data provenance in body area networks using lightweight wireless link fingerprints. Search on Bibsonomy TrustED@CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ahmad-Reza Sadeghi, Frederik Armknecht, Jean-Pierre Seifert (eds.) TrustED'13, Proceedings of the 2013 ACM Workshop on Trustworthy Embedded Devices, Co-located with CCS 2013, November 4, 2013, Berlin, Germany Search on Bibsonomy TrustED@CCS The full citation details ... 2013 DBLP  BibTeX  RDF
1Robbert van den Berg, Boris Skoric, Vincent van der Leest Bias-based modeling and entropy analysis of PUFs. Search on Bibsonomy TrustED@CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Anthony Van Herrewege, Vincent van der Leest, André Schaller, Stefan Katzenbeisser 0001, Ingrid Verbauwhede Secure PRNG seeding on commercial off-the-shelf microcontrollers. Search on Bibsonomy TrustED@CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christian Boit, Clemens Helfmeier, Dmitry Nedospasov Feasibly clonable functions. Search on Bibsonomy TrustED@CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xinxin Fan, Nusa Zidaric, Mark D. Aagaard, Guang Gong Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic. Search on Bibsonomy TrustED@CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mads Dam, Roberto Guanciale, Hamed Nemati Machine code verification of a tiny ARM hypervisor. Search on Bibsonomy TrustED@CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Matthias Hiller, Michael Weiner, Leandro Rodrigues Lima, Maximilian Birkner, Georg Sigl Breaking through fixed PUF block limitations with differential sequence coding and convolutional codes. Search on Bibsonomy TrustED@CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dominik Merli, Rainer Plaga Physical unclonable functions: devices for cryptostorage. Search on Bibsonomy TrustED@CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nourhene Ellouze, Mohamed Allouche, Habib Ben Ahmed, Slim Rekhis, Noureddine Boudriga Securing implantable cardiac medical devices: use of radio frequency energy harvesting. Search on Bibsonomy TrustED@CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #42 of 42 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license