The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for smartcards with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-1998 (15) 1999 (15) 2000-2001 (33) 2002 (15) 2003-2004 (27) 2005 (20) 2006 (25) 2007-2008 (25) 2009-2012 (19) 2013-2022 (12)
Publication types (Num. hits)
article(30) incollection(1) inproceedings(173) phdthesis(2)
Venues (Conferences, Journals, ...)
CARDIS(14) CHES(13) CCS(5) E-smart(5) ACISP(4) Comput. Secur.(4) FDTC(4) ACNS(3) CRYPTO(3) FSE(3) IACR Cryptol. ePrint Arch.(3) ICISC(3) PATMOS(3) SAC(3) Smartcard(3) ACM Trans. Inf. Syst. Secur.(2) More (+10 of total 130)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 232 occurrences of 118 keywords

Results
Found 206 publication records. Showing 206 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
23Jean-Jacques Quisquater, David Samyde Automatic Code Recognition for Smartcards Using a Kohonen Neural Network. Search on Bibsonomy CARDIS The full citation details ... 2002 DBLP  BibTeX  RDF
23Bruno Struif, Dirk Scheuermann Smartcards with biometric user verification. Search on Bibsonomy ICME (2) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23Matthias Honka UNDINE / Smartcards und PKI zur medienbruchfreien elektronischen Softwarebeschaffung. Search on Bibsonomy DFN-Arbeitstagung über Kommunikationsnetze The full citation details ... 2002 DBLP  BibTeX  RDF
23Roger Kilian-Kehr Mobile security with smartcards. Search on Bibsonomy 2002   RDF
23Stefan Fünfrocken Protecting Mobile Web-Commerce Agents with Smartcards. Search on Bibsonomy Auton. Agents Multi Agent Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Antonis Galetsas, Stephan Brunessaux, Stefan Hoernschemeyer Achieving universal access for European e-government applications - A case study of two European projects in the field of e-voting and smartcards. Search on Bibsonomy HCI The full citation details ... 2001 DBLP  BibTeX  RDF
23Rajeev Goré, Phuong Thê Nguyên CardS4: Modal Theorem Proving on Java Smartcards. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF security of mobile code, modal deduction
23Pascal Urien, Hayder Saleh, Adel Tizraoui XML Smartcards. Search on Bibsonomy ICN (1) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Erik Donner Chancen und Möglichkeiten von SmartCards im universitären Umfeld. Search on Bibsonomy DFN Arbeitstagung über Kommunikationsnetze The full citation details ... 2001 DBLP  BibTeX  RDF
23Thomas Probst Biometrie und SmartCards - Wie kann Datenschutz technisch sichergestellt werden? Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2000 DBLP  BibTeX  RDF
23Stefan Lucks, Rüdiger Weis How to Make DES-based Smartcards fit for the 21-st Century. Search on Bibsonomy CARDIS The full citation details ... 2000 DBLP  BibTeX  RDF
23Els Van Herreweghen, Uta Wille Using EMV Smartcards for Internet Payments. Search on Bibsonomy ECIS The full citation details ... 2000 DBLP  BibTeX  RDF
23Rita Mayer-Sommer Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
23Markus Kuhn 0001, Oliver Kömmerling Physical security of smartcards. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
23Stefan Fünfrocken Protecting Mobile Web-Commerce Agents with Smartcards. Search on Bibsonomy ASA/MA The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
23Vincent Rijmen, Joan Daemen Efficient Block Ciphers for Smartcards. Search on Bibsonomy Smartcard The full citation details ... 1999 DBLP  BibTeX  RDF
23Thomas S. Messerges, Ezzy A. Dabbish Investigations of Power Analysis Attacks on Smartcards. Search on Bibsonomy Smartcard The full citation details ... 1999 DBLP  BibTeX  RDF
23Naomaru Itoi, Peter Honeyman, Jim Rees SCFS: A UNIX Filesystem for Smartcards. Search on Bibsonomy Smartcard The full citation details ... 1999 DBLP  BibTeX  RDF
23Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sloan Power Analysis Attacks of Modular Exponentiation in Smartcards. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
23Mark Stirland Smartcards in secure Electronic Commerce. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
23Boris Balacheff, Bruno Van Wilder, David Chan Smartcards - From Security Tokens to Intelligent Adjuncts. Search on Bibsonomy CARDIS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
23Patrick Biget The Vault, an Architecture for Smartcards to Gain Infinite Memory. Search on Bibsonomy CARDIS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
23Ross J. Anderson, Eli Biham, Lars R. Knudsen Serpent and Smartcards. Search on Bibsonomy CARDIS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
23Hagen Ploog, Dirk Timmermann FPGA-Based Architecture Evaluation of Cryptographic Coprocessors for Smartcards. Search on Bibsonomy FCCM The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
23Martine Lapère, Eric Johnson User Authentication in Mobile Telecommunication Environments Using Voice Biometrics and Smartcards. Search on Bibsonomy IS&N The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
23Thomas J. Alexandre Biometrics on Smartcards: An Approach to Keyboard Behavioral Signature. Search on Bibsonomy CARDIS The full citation details ... 1996 DBLP  BibTeX  RDF
23Matt Blaze High-Bandwidth Encryption with Low-Bandwidth Smartcards. Search on Bibsonomy FSE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
23Thomas Hardjono, Jennifer Seberry Applications of smartcards for anonymous and verifiable databases. Search on Bibsonomy Comput. Secur. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
23John Leach Dynamic authentication for smartcards. Search on Bibsonomy Comput. Secur. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
23Jerome Svigals Smartcards - A security assessment. Search on Bibsonomy Comput. Secur. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
23Ken J. Fifield Smartcards outsmart computer crime. Search on Bibsonomy Comput. Secur. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
21Dawei Zhang, Zhen Han, Wei Jin Optimized Java Card transaction mechanism based on object locality. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF transaction, smartcards, Java Card
21Camille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi Short-Memory Scalar Multiplication for Koblitz Curves. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Efficiency, Public key cryptosystems, Smartcards, Koblitz Curves
21Benjamin Arazi Communication-Computation Trade-off in Executing ECDSA in a Contactless Smartcard. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, elliptic curve cryptography, smartcards, ECDSA
21Girish B. Ratanpal, Ronald D. Williams, Travis N. Blalock An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF VLSI, smartcards, DES, security and protection, Power analysis attacks, code breaking
21Ulrich Waldmann, Dirk Scheuermann, Claudia Eckert 0001 Protected transmission of biometric user authentication data for oncard-matching. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF oncard-matching, tamper proof environment, authentication, data integrity, biometrics, cryptographic protocols, smartcards, system security, electronic signature
21Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier A generic approach for healthcare data anonymization. Search on Bibsonomy WPES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF inferences in databases, privacy, anonymization, smartcards
21Carsten Schwesig, Ivan Poupyrev, Eijiro Mori Gummi: a bendable computer. Search on Bibsonomy CHI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF flexible electronics, mobile computing, interaction design, GUI, handheld devices, smartcards, embodied interaction
21Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stéphane Tinguely Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF commercial and industrial security, COMP128, authentication, security protocols, side channel attacks, smartcards, GSM
13Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume Bipartite modular multiplication with twice the bit-length of multipliers. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Bipartite modular multiplication, Double-size technique, RSA, Smartcard, Montgomery multiplication, Modular multiplication
13Wansuck Yi, Seungjoo Kim, Dongho Won Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments. Search on Bibsonomy ICCSA (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF known-key secrecy, authentication, pervasive computing, biometrics, smart card, key exchange, forward secrecy
13Corinne S. Irwin, Dennis C. Taylor Identity, credential, and access management at NASA, from Zachman to attributes. Search on Bibsonomy IDtrust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attribute-based access control (ABAC), level of assurance (LoA), logical access control system (LACS)
13Jan Camenisch, Thomas Groß 0001 Efficient attributes for anonymous credentials. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF efficient attribute encoding, privacy, cryptographic protocols, anonymous credential systems
13Mariano Ceccato, Jasvir Nagra, Paolo Tonella Distributing Trust Verification to Increase Application Performance. Search on Bibsonomy PDP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF remote trust, smartcard, tamper resistant
13Jing Pan, J. I. den Hartog, Erik P. de Vink An Operation-Based Metric for CPA Resistance. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume A Black Hen Lays White Eggs. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF double-size technique, RSA, smartcard, Montgomery multiplication, efficient implementation
13Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, Srinivas Devadas The Trusted Execution Module: Commodity General-Purpose Trusted Computing. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan The Long-Short-Key Primitive and Its Applications to Key Security. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Lang Lin, Wayne P. Burleson Leakage-based differential power analysis (LDPA) on sub-90nm CMOS cryptosystems. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Roberto Cortiñas, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea, Lucia Draque Penso, Iratxe Soraluze Arriola Secure Failure Detection in TrustedPals. Search on Bibsonomy SSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Carole Delporte-Gallet, Hugues Fauconnier, Felix C. Freiling, Lucia Draque Penso, Andreas Tielmann From Crash-Stop to Permanent Omission: Automatic Transformation and Weakest Failure Detectors. Search on Bibsonomy DISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13MohammadReza Gholami, Seyyed Mohsen Hashemi, Mohammad Teshnehlab A Framework for Secure Message Transmission Using SMS-Based VPN. Search on Bibsonomy CONFENIS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Privacy, Trust, E-commerce, E-business, EAI, EDI
13Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume Double-Size Bipartite Modular Multiplication. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF bipartite modular multiplication, double-size technique, RSA, smartcard, crypto-coprocessor
13Sea Ling, Seng Wai Loke, Maria Indrawan Towards a Model of Interaction for Mutual Aware Devices and Everyday Artifacts. Search on Bibsonomy UIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Marina Blanton, Mikhail J. Atallah Succinct representation of flexible and privacy-preserving access rights. Search on Bibsonomy VLDB J. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Privacy-preserving access rights, Flexible access rights, Compact representation
13Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli Power Modeling of Precharged Address Bus and Application to Multi-bit DPA Attacks to DES Algorithm. Search on Bibsonomy PATMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli Techniques to Enhance the Resistance of Precharged Busses to Differential Power Analysis. Search on Bibsonomy PATMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA, smartcard, Montgomery multiplication, crypto-coprocessor
13Masayuki Terada, Kensaku Mori, Sadayuki Hongo An Optimistic NBAC-Based Fair Exchange Method for Arbitrary Items. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Camille Vuillaume, Katsuyuki Okeya Flexible Exponentiation with Resistance to Side Channel Attacks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fractional width, RSA, side channel attacks, simple power analysis
13Ad M. G. Peeters Clockless IC design using handshake technology. Search on Bibsonomy ISPD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Reynald Affeldt, Nicolas Marti An Approach to Formal Verification of Arithmetic Functions in Assembly. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Daihyun Lim, Jae W. Lee, Blaise Gassend, G. Edward Suh, Marten van Dijk, Srinivas Devadas Extracting secret keys from integrated circuits. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Boaz Barak, Shai Halevi A model and architecture for pseudo-random generation with applications to /dev/random. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dev/random, mixing functions, true randomness, entropy, smart-cards, pseudo-randomness
13Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia Secure Biometric Authentication for Weak Computational Devices. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, biometrics, smart cards, cryptographic hash functions
13JaeCheol Ha, ChangKyun Kim, Sang-Jae Moon, IlHwan Park, HyungSo Yoo Differential Power Analysis on Block Cipher ARIA. Search on Bibsonomy HPCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Douglas E. Ennis The wireless tightrope: an economical, secure, and user friendly approach for the wireless campus. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF EAP-TLS, MSCHAPv2, PEAP, SSL certificates, SWAN, WLCCP, WEP, 802.1X
13Marina Blanton, Mikhail J. Atallah Provable bounds for portable and flexible privacy-preserving access. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF compact policy representation, minimal perfect hash functions, order-preserving minimal perfect hash functions, portable access rights, algorithm analysis
13Antonio Muñoz 0001, Jose Antonio Onieva, Javier López 0001 On Secure Profiling. Search on Bibsonomy DEXA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Alain Merle, Jessy Clédière Security Testing for Hardware Products: The Security Evaluations Practice. Search on Bibsonomy IOLTS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm Templates as Master Keys. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Sergei P. Skorobogatov Data Remanence in Flash Memory Devices. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
13Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Asymmetric Signature, C *, C *-, Hidden Monomial Problem, Side Channel Attacks, SHA-1, SFLASH
13Raul Sánchez-Reillo, Judith Liu-Jimenez, Luis Entrena Architectures for Biometric Match-on-Token Solutions. Search on Bibsonomy ECCV Workshop BioAW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Engelbert Hubbers, Erik Poll Reasoning about Card Tears and Transactions in Java Card. Search on Bibsonomy FASE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Jiun-Ming Chen, Bo-Yin Yang A More Secure and Efficacious TTS Signature Scheme. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13MahnKi Ahn, JaeCheol Ha, Hoon-Jae Lee 0001, Sang-Jae Moon A Random M-ary Method Based Countermeasure against Side Channel Attacks. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Random m-ary Recoding Algorithm, Side Channel Attacks, DPA, Elliptic Curve Cryptosystems, SPA, Power Analysis Attacks
13Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard Attacking Unbalanced RSA-CRT Using SPA. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Dominik Haneberg, Wolfgang Reif, Kurt Stenzel A Method for Secure Smartcard Applications. Search on Bibsonomy AMAST The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Humberto Martínez Barberá, Gregorio Martínez Pérez Different Smartcard-Based Approaches to Physical Access Control. Search on Bibsonomy InfraSec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Greg Maitland, Colin Boyd Co-operatively Formed Group Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Spike attacks, Software countermeasures, Transient fault model, RSA, Chinese Remainder Theorem, Fault attacks, Hardware security, Bellcore attack
13Sergei P. Skorobogatov, Ross J. Anderson Optical Fault Induction Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Herbert Leitold, Arno Hollosi, Reinhard Posch Security Architecture of the Austrian Citizen Card Concept. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Pieter H. Hartel, Luc Moreau 0001 Formalizing the safety of Java, the Java virtual machine, and Java card. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF programming, Common criteria
13Roger Kehr, Hendrik Mieves SIMspeak - Towards an Open and Secure Application Platform for GSM SIMs. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Pascal Urien Programming Internet Smartcard with XML Scripts. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Clemens H. Cap, Nico Maibaum, Lars Heyden Extending the Data Storage Capabilities of a Java-Based Smartcard. Search on Bibsonomy ISCC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Kimio Kuramitsu, Ken Sakamura Towards ubiquitous database in mobile commerce. Search on Bibsonomy MobiDE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF data model and querying for ubiquitous data, smartcard database, ubiquitous computing, mobile commerce
13Rainer Steinwandt, Willi Geiselmann, Thomas Beth A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13David May 0001, Henk L. Muller, Nigel P. Smart Non-deterministic Processors. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali Identification Protocols Secure against Reset Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Kouichi Itoh, Masahiko Takenaka, Naoya Torii DPA Countermeasure Based on the "Masking Method". Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF masking method, DPA, countermeasure, Rijndael
13David May 0001, Henk L. Muller, Nigel P. Smart Random Register Renaming to Foil DPA. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Diomidis Spinellis Reflection as a mechanism for software integrity verification. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF message digest, cryptographic hash function, embedded device
13Juan A. Garay, Jessica Staddon, Avishai Wool Long-Lived Broadcast Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Praveen Seshadri "Honey, I Shrunk the DBMS": Footprint, Mobility, and Beyond (Panel). Search on Bibsonomy SIGMOD Conference The full citation details ... 1999 DBLP  DOI  BibTeX  RDF small-footprint database, mobile computing
13Sigrid Gürgens, Javier López 0001, René Peralta 0001 Efficient Detection of Failure Modes in Electronic Commerce Protocols. Search on Bibsonomy DEXA Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
13Stefan Lucks Accelerated Remotely Keyed Encruption. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 206 (100 per page; Change: )
Pages: [<<][1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license