The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WESS"( http://dblp.L3S.de/Venues/WESS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cases

Publication years (Num. hits)
2009 (10) 2010 (13) 2013 (9) 2014 (10) 2015 (11)
Publication types (Num. hits)
inproceedings(48) proceedings(5)
Venues (Conferences, Journals, ...)
WESS(53)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 24 occurrences of 21 keywords

Results
Found 53 publication records. Showing 53 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ermis Papastefanakis, Bruno Maitre, Dominique Ragot Security Challenges in ManyCore Embedded Systems based on Networks-on-Chip (NoCs). Search on Bibsonomy WESS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pedro Malagón, Juan-Mariano de Goyeneche, David Fraga 0001, José Manuel Moya Bitslice software implementation of KeeLoq as a side-channel countermeasure. Search on Bibsonomy WESS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jakub Breier, Dirmanto Jap Testing Feasibility of Back-Side Laser Fault Injection on a Microcontroller. Search on Bibsonomy WESS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sixing Lu, Roman Lysecky Analysis of Control Flow Events for Timing-based Runtime Anomaly Detection. Search on Bibsonomy WESS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christian Krieg, Daniel Neubacher CHEF: A Configurable Hardware Trojan Evaluation Framework. Search on Bibsonomy WESS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stavros A. Koubias, Thilo Sauter (eds.) Proceedings of the 10th Workshop on Embedded Systems Security, WESS 2015, Amsterdam, The Netherlands, October 8, 2015 Search on Bibsonomy WESS The full citation details ... 2015 DBLP  BibTeX  RDF
1Taimour Wehbe, Vincent John Mooney, David C. Keezer, Nicholas B. Parham A Novel Approach to Detect Hardware Trojan Attacks on Primary Data Inputs. Search on Bibsonomy WESS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Paula Vasile, Bogdan Groza, Pal-Stefan Murvay Performance analysis of broadcast authentication protocols on CAN-FD and FlexRay. Search on Bibsonomy WESS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Omaimah Omar Bamasag, Kamal Youcef-Toumi Towards Continuous Authentication in Internet of Things Based on Secret Sharing Scheme. Search on Bibsonomy WESS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anju P. Johnson, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay A Novel Attack on a FPGA based True Random Number Generator. Search on Bibsonomy WESS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Muhammad Taimoor Khan 0001, Anastasios Fragopoulos, Dimitrios N. Serpanos, Howard E. Shrobe Abstract Data Machine: Data Classifier for Reliable Embedded Systems Software. Search on Bibsonomy WESS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Oscar M. Guillen, Ralf Brederlow, Ralph Ledwa, Georg Sigl Risk management in embedded devices using metering applications as example. Search on Bibsonomy WESS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1João Amaral, Francesco Regazzoni 0001, Pedro Tomás, Ricardo Chaves Accelerating differential power analysis on heterogeneous systems. Search on Bibsonomy WESS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xuan Thuy Ngo, Sylvain Guilley, Shivam Bhasin, Jean-Luc Danger, Zakaria Najm Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses. Search on Bibsonomy WESS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Aderinola Gbade-Alabi, David C. Keezer, Vincent John Mooney, Axel York Poschmann, Marc Stöttinger, Kshitij Divekar A signature based architecture for Trojan detection. Search on Bibsonomy WESS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Marilyn Wolf, Saibal Mukhopadhyay Information theoretic models for signatures in VLSI power delivery systems. Search on Bibsonomy WESS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ting Yu, Shengqi Yang (eds.) Proceedings of the 9th Workshop on Embedded Systems Security, WESS '14, New Delhi, India, October 17, 2014 Search on Bibsonomy WESS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bodhisatwa Mazumdar Some RSSB constructions with improved resistance towards differential power analysis. Search on Bibsonomy WESS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andreas Papalambrou, Kyriakos Stefanidis, John V. Gialelis, Dimitrios N. Serpanos Detection, traceback and filtering of denial of service attacks in networked embedded systems. Search on Bibsonomy WESS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anju P. Johnson, Sayandeep Saha, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay, Sezer Gören 0001 Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet. Search on Bibsonomy WESS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Debasri Saha, Susmita Sur-Kolay Trusted sharing of intellectual property in electronic hardware design. Search on Bibsonomy WESS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Aydin Aysu, Nahid Farhady Ghalaty, Zane R. Franklin, Moein Pahlavan Yali, Patrick Schaumont Digital fingerprints for low-cost platforms using MEMS sensors. Search on Bibsonomy WESS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Valentina Banciu, Simon Hoerder, Dan Page Light-weight primitive, feather-weight security: a cryptanalytic knock-out. Search on Bibsonomy WESS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sebastian Kutzner, Axel York Poschmann, Marc Stöttinger Hardware trojan design and detection: a practical evaluation. Search on Bibsonomy WESS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Andrea Höller, Christopher Preschern, Christian Steger, Christian Kreiner, Armin Krieg, Holger Bock, Josef Haid Automatized high-level evaluation of security properties for RTL hardware designs. Search on Bibsonomy WESS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gangqiang Yang, Xinxin Fan, Mark D. Aagaard, Guang Gong Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs. Search on Bibsonomy WESS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Arash Vahidi, Christopher Jämthagen Secure RPC in embedded systems: evaluation of some GlobalPlatform implementation alternatives. Search on Bibsonomy WESS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1 Proceedings of the Workshop on Embedded Systems Security, WESS 2013, Montreal, Quebec, Canada, September 29 - October 4, 2013 Search on Bibsonomy WESS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm A low-entropy first-degree secure provable masking scheme for resource-constrained devices. Search on Bibsonomy WESS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michal Parusinski, Saloomeh Shariati, Dina Kamel, François-Xavier Standaert Strong PUFs and their (physical) unpredictability: a case study with power PUFs. Search on Bibsonomy WESS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Leandro Fiorin, Alberto Ferrante, Konstantinos Padarnitsas, Stefano Carucci Hardware-assisted security enhanced Linux in embedded systems: a proposal. Search on Bibsonomy WESS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dominik Merli, Frederic Stumpf, Claudia Eckert 0001 Improving the quality of ring oscillator PUFs on FPGAs. Search on Bibsonomy WESS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Slobodan Lukovic, Nikolaos Christianos Enhancing network-on-chip components to support security of processing elements. Search on Bibsonomy WESS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Luis Angel D. Bathen, Nikil D. Dutt PoliMakE: a policy making engine for secure embedded software execution on chip-multiprocessors. Search on Bibsonomy WESS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nevine Maurice Ebeid, Rob Lambert A new CRT-RSA algorithm resistant to powerful fault attacks. Search on Bibsonomy WESS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Christopher Szilagyi, Philip Koopman Low cost multicast authentication via validity voting in time-triggered embedded control networks. Search on Bibsonomy WESS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 5th Workshop on Embedded Systems Security, WESS 2010, Scottsdale, AZ, USA, October 24, 2010 Search on Bibsonomy WESS The full citation details ... 2010 DBLP  BibTeX  RDF
1Ted Huffmire, Timothy E. Levin, Michael Bilzor, Cynthia E. Irvine, Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood, Ryan Kastner Hardware trust implications of 3-D integration. Search on Bibsonomy WESS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alessandro Barenghi, Luca Breveglieri, Israel Koren, Gerardo Pelosi, Francesco Regazzoni 0001 Countermeasures against fault attacks on software implemented AES: effectiveness and cost. Search on Bibsonomy WESS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Abdourhamane Idrissa, Alain Aubert, Thierry Fournel, Viktor Fischer Secure protocols for serverless remote product authentication. Search on Bibsonomy WESS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Edgar Mateos, Catherine H. Gebotys A new correlation frequency analysis of the side channel. Search on Bibsonomy WESS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ambuj Sinha, Zhimin Chen 0002, Patrick Schaumont A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software. Search on Bibsonomy WESS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shivam Bhasin, Sylvain Guilley, Florent Flament, Nidhal Selmane, Jean-Luc Danger Countering early evaluation: an approach towards robust dual-rail precharge logic. Search on Bibsonomy WESS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Antonio Vincenzo Taddeo, Pierpaolo Marcon, Alberto Ferrante Negotiation of security services: a multi-criteria decision approach. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptographic algorithm selection, security, quality of service, cryptography, adaptive systems, AHP, analytic hierarchy process, utility function
1Ilya Kizhvatov Side channel analysis of AVR XMEGA crypto engine. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptography, DPA, side channel analysis
1Philipp Grabher, Johann Großschädl, Dan Page Non-deterministic processors: FPGA-based analysis of area, performance and security. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF micro-architectural countermeasures, non-deterministic processors, side-channel attack, processor design
1Dimitrios N. Serpanos, Wayne H. Wolf (eds.) Proceedings of the 4th Workshop on Embedded Systems Security, WESS 2009, Grenoble, France, October 15, 2009 Search on Bibsonomy WESS The full citation details ... 2009 DBLP  BibTeX  RDF
1Jean-Sébastien Coron, Ilya Kizhvatov Analysis of the split mask countermeasure for embedded systems. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, DPA, side channel analysis, countermeasures, masking
1Thomas Winkler 0002, Bernhard Rinner Applications of trusted computing in pervasive smart camera networks. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Juan Carlos Martínez Santos, Yunsi Fei, Zhijie Jerry Shi PIFT: efficient dynamic information flow tracking using secure page allocation. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF control flow validation, security attacks, program validation
1Ahmadou Al Khary Séré, Julien Iguchi-Cartigny, Jean-Louis Lanet Automatic detection of fault attack and countermeasures. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jörg Brauer, Bastian Schlich, Thomas Reinbacher, Stefan Kowalewski Stack bounds analysis for microcontroller assembly code. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF model checking, verification, static analysis, embedded software, assembly code
1Miroslav Knezevic, Ingrid Verbauwhede Hardware evaluation of the Luffa hash family. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Luffa hash algorithm, SHA-3 competition, ASIC implementations
Displaying result #1 - #53 of 53 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license