Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Hui Wang, Wei Guo 0005, Jizeng Wei |
Practical chosen-message CPA attack on message blinding exponentiation algorithm and its efficient countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Wide Web ![In: World Wide Web 21(1), pp. 201-217, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Daishi Kondo, Thomas Silverston, Vassilis Vassiliades, Hideki Tode, Tohru Asami |
Name Filter: A Countermeasure Against Information Leakage Attacks in Named Data Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 6, pp. 65151-65170, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Mahmoud E. Abdelgelil, Hlaing Minn |
Impact of Nonlinear RFI and Countermeasure for Radio Astronomy Receivers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 6, pp. 11424-11438, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Michael Weiner, Salvador Manich, Rosa Rodríguez-Montañés, Georg Sigl |
The Low Area Probing Detector as a Countermeasure Against Invasive Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 26(2), pp. 392-403, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Zimu Guo, Xiaolin Xu, Md. Tauhidur Rahman 0001, Mark M. Tehranipoor, Domenic Forte |
SCARe: An SRAM-Based Countermeasure Against IC Recycling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 26(4), pp. 744-755, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Davide Bellizia, Simone Bongiovanni, Pietro Monsurrò, Giuseppe Scotti, Alessandro Trifiletti, Francesco Bruno Trotta |
Secure Double Rate Registers as an RTL Countermeasure Against Power Analysis Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 26(7), pp. 1368-1376, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Qi Zhang, Azzedine Boukerche |
A Novel Infrastructure-Based Worm Spreading Countermeasure for Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 19(7), pp. 2188-2203, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Shuaiwei Zhang, Weidong Zhong |
A New Type of Countermeasure against DPA in Multi-Sbox of Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Commun. Mob. Comput. ![In: Wirel. Commun. Mob. Comput. 2018, pp. 5945312:1-5945312:11, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Zuochao Dou, Issa Khalil, Abdallah Khreishah, Ala I. Al-Fuqaha |
Robust Insider Attacks Countermeasure for Hadoop: Design and Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 12(2), pp. 1874-1885, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Cong Pu, Sunho Lim |
A Light-Weight Countermeasure to Forwarding Misbehavior in Wireless Sensor Networks: Design, Analysis, and Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 12(1), pp. 834-842, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Grégory Froger, Colin Blättler, Emilien Dubois, Cyril Camachon, Nathalie Bonnardel |
Time-Interval Emphasis in an Aeronautical Dual-Task Context: A Countermeasure to Task Absorption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hum. Factors ![In: Hum. Factors 60(7), pp. 936-946, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Subhash Lakshminarayana, Jabir Shabbir Karachiwala, Sang-Yoon Chang, Girish Revadigar, Sristi Lakshmi Sravana Kumar, David K. Y. Yau, Yih-Chun Hu |
Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1808.01723, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
15 | Yongdong Wu, Binbin Chen 0001, Zhigang Zhao, Yao Cheng |
Attack and Countermeasure on Interlock-Based Device Pairing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 13(3), pp. 745-757, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Jingdian Ming, Wei Cheng 0003, Huizhong Li, Guang Yang, Yongbin Zhou, Qian Zhang 0042 |
Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 745, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
15 | Debayan Das, Mayukh Nath, Baibhab Chatterjee, Santosh Ghosh, Shreyas Sen |
Ground-up Root-cause Analysis guided Low-Overhead Generic Countermeasure for Electro-Magnetic Side-Channel Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 620, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
15 | Jitendra K. Tugnait |
Pilot Spoofing Attack Detection and Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 66(5), pp. 2093-2106, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Davide Bellizia, Giuseppe Scotti, Alessandro Trifiletti |
TEL Logic Style as a Countermeasure Against Side-Channel Attacks: Secure Cells Library in 65nm CMOS and Experimental Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. I Regul. Pap. ![In: IEEE Trans. Circuits Syst. I Regul. Pap. 65-I(11), pp. 3874-3884, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Heasin Ko, Byung-Seok Choi, Joong-Seon Choe, Chun Ju Youn |
Advanced unambiguous state discrimination attack and countermeasure strategy in a practical B92 QKD system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 17(1), pp. 17, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Jinbao Zhang 0002, Ning Wu, Fen Ge, Fang Zhou 0001, Xiaoqing Zhang |
Countermeasure against fault sensitivity analysis based on clock check block. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Electron. Express ![In: IEICE Electron. Express 15(11), pp. 20180433, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Alireza Shameli-Sendi, Habib Louafi, Wenbo He, Mohamed Cheriet |
Dynamic Optimal Countermeasure Selection for Intrusion Response System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 15(5), pp. 755-770, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Igor V. Kotenko, Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko |
AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 101-130, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Xiangsong Gao, Hui Lu 0005, Xiang Cui, Le Wang 0008 |
An Encryption Traffic Analysis Countermeasure Model Based on Game Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS (1) ![In: Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I, pp. 285-292, 2018, Springer, 978-3-030-00005-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Kai Yang 0028, Jungmin Park, Mark M. Tehranipoor, Swarup Bhunia |
Robust Timing Attack Countermeasure on Virtual Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVLSI ![In: 2018 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2018, Hong Kong, China, July 8-11, 2018, pp. 148-153, 2018, IEEE Computer Society, 978-1-5386-7099-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Bhusan Chettri, Bob L. Sturm, Emmanouil Benetos |
Analysing Replay Spoofing Countermeasure Performance under varied conditions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MLSP ![In: 28th IEEE International Workshop on Machine Learning for Signal Processing, MLSP 2018, Aalborg, Denmark, September 17-20, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-5477-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Satyadev Ahlawat, Darshit Vaghani, Naveen Bazard, Virendra Singh |
Using MISR as Countermeasure Against Scan-Based Side-Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EWDTS ![In: 2018 IEEE East-West Design & Test Symposium, EWDTS 2018, Kazan, Russia, September 14-17, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-5710-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Stanislav Jerabek, Jan Schmidt, Martin Novotný, Vojtech Miskovský |
Dummy Rounds as a DPA Countermeasure in Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSD ![In: 21st Euromicro Conference on Digital System Design, DSD 2018, Prague, Czech Republic, August 29-31, 2018, pp. 523-528, 2018, IEEE Computer Society, 978-1-5386-7377-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Ievgen Kabin, Dan Kreiser, Zoya Dyka, Peter Langendörfer |
FPGA Implementation of ECC: Low-Cost Countermeasure against Horizontal Bus and Address-Bit SCA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ReConFig ![In: 2018 International Conference on ReConFigurable Computing and FPGAs, ReConFig 2018, Cancun, Mexico, December 3-5, 2018, pp. 1-7, 2018, IEEE, 978-1-7281-1968-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko |
Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, pp. 62:1-62:8, 2018, ACM, 978-1-4503-6448-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Masaya Yoshikawa, Yusuke Nozaki |
Lightweight Cipher Aware Countermeasure Using Random Number Masks and Its Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICVISP ![In: Proceedings of the 2nd International Conference on Vision, Image and Signal Processing, ICVISP 2018, Las Vegas, NV, USA, August 27-29, 2018, pp. 55:1-55:5, 2018, ACM, 978-1-4503-6529-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Devansh Gupta, Somanath Tripathy, Bodhisatwa Mazumdar |
Correlation Power Analysis on KASUMI: Attack and Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPACE ![In: Security, Privacy, and Applied Cryptography Engineering - 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings, pp. 142-156, 2018, Springer, 978-3-030-05071-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Ziyan Shi, Guolin Zhao, Qiaolin Hu |
The Research of Electronic Countermeasure Intelligence Correlation Analysis Based on Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSAI ![In: 5th International Conference on Systems and Informatics, ICSAI 2018, Nanjing, China, November 10-12, 2018, pp. 389-394, 2018, IEEE, 978-1-7281-0120-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Marion Renaldo Rotinsulu, Riri Fitri Sari |
Performance Evaluation of Several Interest Flooding Attack (IFA) Countermeasure Method on ISP-like Topology for Named Data Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TENCON ![In: TENCON 2018 - 2018 IEEE Region 10 Conference, Jeju, South Korea, October 28-31, 2018, pp. 826-831, 2018, IEEE, 978-1-5386-5457-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Yoshimichi Nakatsuka, Janaka L. Wijekoon, Hiroaki Nishi |
FROG: A Packet Hop Count based DDoS Countermeasure in NDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: 2018 IEEE Symposium on Computers and Communications, ISCC 2018, Natal, Brazil, June 25-28, 2018, pp. 492-497, 2018, IEEE, 978-1-5386-6950-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Chenguang Wang 0003, Yici Cai, Haoyi Wang, Qiang Zhou 0001 |
Electromagnetic equalizer: an active countermeasure against EM side-channel attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: Proceedings of the International Conference on Computer-Aided Design, ICCAD 2018, San Diego, CA, USA, November 05-08, 2018, pp. 112, 2018, ACM, 978-1-4503-5950-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Xiaofei Dong, Fan Zhang 0010, Samiya Qureshi, Yiran Zhang, Ziyuan Liang, Bolin Yang, Feng Gao |
A Wavelet-based Power Analysis Attack against Random Delay Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsianHOST ![In: Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2018, Hong Kong, China, December 17-18, 2018, pp. 19-24, 2018, IEEE, 978-1-5386-7471-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Giacomo Valenti, Héctor Delgado, Massimiliano Todisco, Nicholas W. D. Evans, Laurent Pilati |
An end-to-end spoofing countermeasure for automatic speaker verification using evolving recurrent neural networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Odyssey ![In: Odyssey 2018: The Speaker and Language Recognition Workshop, 26-29 June 2018, Les Sables d'Olonne, France, pp. 288-295, 2018, ISCA. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Umar Albalawi |
Countermeasure of Statistical Inference in Database Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE BigData ![In: IEEE International Conference on Big Data (IEEE BigData 2018), Seattle, WA, USA, December 10-13, 2018, pp. 2044-2047, 2018, IEEE, 978-1-5386-5035-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Victor Arribas, Thomas De Cnudde, Danilo Sijacic |
Glitch-Resistant Masking Schemes as Countermeasure Against Fault Sensitivity Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2018, Amsterdam, The Netherlands, September 13, 2018, pp. 27-34, 2018, IEEE Computer Society, 978-1-5386-8197-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Shenghua Chen, Wei Ge, Jinjiang Yang, Bo Liu 0019, Jun Yang 0006 |
A Power Analysis Attack Countermeasure Based on Random Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/BigDataSE ![In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018, pp. 1474-1479, 2018, IEEE, 978-1-5386-4388-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Ziyan Shi, Guolin Zhao, Qiaolin Hu |
The Research of Electronic Countermeasure Intelligence Correlation Analysis Based on Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISP-BMEI ![In: 11th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2018, Beijing, China, October 13-15, 2018, pp. 1-9, 2018, IEEE, 978-1-5386-7604-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Weize Yu, Yiming Wen |
Leakage Power Analysis (LPA) Attack in Breakdown Mode and Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoCC ![In: 31st IEEE International System-on-Chip Conference, SOCC 2018, Arlington, VA, USA, September 4-7, 2018, pp. 102-105, 2018, IEEE, 978-1-5386-1491-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer |
Low-Cost Countermeasure against Horizontal Bus and Address-Bit SCA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Krypto-Tag ![In: 29. Krypto-Tag, Renningen, Germany, September 6-7, 2018, 2018, Gesellschaft für Informatik e.V. / FG KRYPTO. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Sarani Bhattacharya, Shivam Bhasin, Debdeep Mukhopadhyay |
Online Detection and Reactive Countermeasure for Leakage from BPU Using TVLA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSID ![In: 31st International Conference on VLSI Design and 17th International Conference on Embedded Systems, VLSID 2018, Pune, India, January 6-10, 2018, pp. 155-160, 2018, IEEE Computer Society, 978-1-5386-3692-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Francisco Eugenio Potestad-Ordóñez, Carlos Jesús Jiménez-Fernández, Carmen Baena Oliva, Pilar Parra Fernández, Manuel Valencia-Barrero |
Floorplanning as a practical countermeasure against clock fault attack in Trivium stream cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCIS ![In: Conference on Design of Circuits and Integrated Systems, DCIS 2018, Lyon, France, November 14-16, 2018, pp. 1-6, 2018, IEEE, 978-1-7281-0171-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Fangming Chai, Kyoung-Don Kang |
A New Power Analysis Attack and a Countermeasure in Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UEMCON ![In: 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2018, New York City, NY, USA, November 8-10, 2018, pp. 645-652, 2018, IEEE, 978-1-5386-7693-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Jayesh Popat, Usha Mehta |
A Novel Countermeasure Against Differential Scan Attack in AES Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VDAT ![In: VLSI Design and Test - 22nd International Symposium, VDAT 2018, Madurai, India, June 28-30, 2018, Revised Selected Papers, pp. 297-309, 2018, Springer, 978-981-13-5949-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Yusuke Nozaki, Masaya Yoshikawa |
Shuffling Based Side-Channel Countermeasure for Energy Harvester. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCCE ![In: IEEE 7th Global Conference on Consumer Electronics, GCCE 2018, Nara, Japan, October 9-12, 2018, pp. 714-715, 2018, IEEE, 978-1-5386-6309-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Ozgun Bal, Mutlu Koca, Emin Anarim |
Open platform for attack and countermeasure analysis on system security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIU ![In: 26th Signal Processing and Communications Applications Conference, SIU 2018, Izmir, Turkey, May 2-5, 2018, pp. 1-4, 2018, IEEE, 978-1-5386-1501-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Subhash Lakshminarayana, Jabir Shabbir Karachiwala, Sang-Yoon Chang, Girish Revadigar, Sristi Lakshmi Sravana Kumar, David K. Y. Yau, Yih-Chun Hu |
Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018, pp. 160-171, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Haihui Zhao, Yaoguang Qi, Hongwei Du 0002, Ningning Wang, Guofu Zhang, Wenbao Liu, Hailong Lu |
Running state of the high energy consuming equipment and energy saving countermeasure for chinese petroleum industry in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 29(14), 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Siraj Fulum Mossa, Syed Rafay Hasan, Omar S. Elkeelany |
Hardware trojans in 3-D ICs due to NBTI effects and countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integr. ![In: Integr. 59, pp. 64-74, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Yunchuan Wang, Xiaorong Xu, Weiwei Wu, Jianrong Bao |
A Primary User Emulation Attack Countermeasure Strategy and Energy-Efficiency Analysis in Cognitive Radio Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Commun. ![In: J. Commun. 12(1), pp. 1-7, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Fei Wang 0019, Hong Li 0003, Mingquan Lu |
GNSS Spoofing Countermeasure With a Single Rotating Antenna. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 5, pp. 8039-8047, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Xiangyu Li, Chaoqun Yang, Jiangsha Ma, Yongchang Liu, Shujuan Yin |
Energy-Efficient Side-Channel Attack Countermeasure With Awareness and Hybrid Configuration Based on It. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 25(12), pp. 3355-3368, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Weize Yu, Selçuk Köse |
Security-Adaptive Voltage Conversion as a Lightweight Countermeasure Against LPA Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 25(7), pp. 2183-2187, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Sikhar Patranabis, Abhishek Chakraborty 0001, Debdeep Mukhopadhyay |
Fault Tolerant Infective Countermeasure for AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Hardw. Syst. Secur. ![In: J. Hardw. Syst. Secur. 1(1), pp. 3-17, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Sabine Azzi, Bruno Barras, Maria Christofi, David Vigilant |
Using linear codes as a fault countermeasure for nonlinear operations: application to AES and formal verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 7(1), pp. 75-85, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Shoei Nashimoto, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, Takafumi Aoki |
Buffer overflow attack with multiple fault injection and a proven countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 7(1), pp. 35-46, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Makoto Nagata, Takafumi Aoki |
Design Methodology and Validity Verification for a Reactive Countermeasure Against EM Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 30(2), pp. 373-391, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Bodhisatwa Mazumdar, Samah Mohamed Saeed, Sk Subidh Ali, Ozgur Sinanoglu |
Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Emerg. Top. Comput. ![In: IEEE Trans. Emerg. Top. Comput. 5(3), pp. 317-328, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | An Wang 0001, Ce Wang, Xuexin Zheng, Weina Tian, Rixin Xu, Guoshuang Zhang |
Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 63, pp. 220-231, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Reza Mohammadi 0003, Reza Javidan, Mauro Conti |
SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Serv. Manag. ![In: IEEE Trans. Netw. Serv. Manag. 14(2), pp. 487-497, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Weize Yu, Selçuk Köse |
False Key-Controlled Aggressive Voltage Scaling: A Countermeasure Against LPA Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(12), pp. 2149-2153, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Tsu-Yang Wu, Chien-Ming Chen 0001, Xiuyang Sun, Shuai Liu, Jerry Chun-Wei Lin |
A Countermeasure to SQL Injection Attack for Cloud Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 96(4), pp. 5279-5293, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Na-Young Ahn, Dong Hoon Lee 0001 |
Countermeasure against Side-Channel Attack in Shared Memory of TrustZone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1705.08279, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
15 | Bo Wang 0023, Leibo Liu, Chenchen Deng, Min Zhu 0001, Shouyi Yin, Zhuoquan Zhou, Shaojun Wei |
Exploration of Benes Network in Cryptographic Processors: A Random Infection Countermeasure for Block Ciphers Against Fault Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 12(2), pp. 309-322, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Peter Pessl |
Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 33, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
15 | Benjamin Lac, Anne Canteaut, Jacques J. A. Fournier, Renaud Sirdey |
Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 910, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
15 | Edward Tan, Anto Satriyo Nugroho, Maulahikmah Galinium |
Contact lens detection for iris spoofing countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Biom. ![In: Int. J. Biom. 9(3), pp. 243-252, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Massimiliano Todisco, Héctor Delgado, Nicholas W. D. Evans |
Constant Q cepstral coefficients: A spoofing countermeasure for automatic speaker verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Speech Lang. ![In: Comput. Speech Lang. 45, pp. 516-535, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Szu-Chi Chung, Chun-Yuan Yu, Sung-Shine Lee, Hsie-Chia Chang, Chen-Yi Lee |
An Improved DPA Countermeasure Based on Uniform Distribution Random Power Generator for IoT Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. I Regul. Pap. ![In: IEEE Trans. Circuits Syst. I Regul. Pap. 64-I(9), pp. 2522-2531, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Shivam Bhasin, Dirmanto Jap, Thomas Peyrin |
Practical Evaluation of FSE 2016 Customized Encoding Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2017(3), pp. 108-129, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Gareth Haken, Konstantinos Markantonakis, Iakovos Gurulian, Carlton Shepherd, Raja Naeem Akram |
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPSS@AsiaCCS ![In: Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017, pp. 21-32, 2017, ACM, 978-1-4503-4956-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Elena Doynikova, Igor V. Kotenko |
CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP 2017, St. Petersburg, Russia, March 6-8, 2017, pp. 346-353, 2017, IEEE Computer Society, 978-1-5090-6058-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Nivindar Kaur, Ashutosh Kumar Singh 0002, Naveen Kumar 0013, Shashank Srivastava |
Performance impact of topology poisoning attack in SDN and its countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017., pp. 179-184, 2017, ACM. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Zhe Ji, Zhi-Yi Li, Peng Li, MaoBo An, Shengxiang Gao, Dan Wu, Faru Zhao |
Ensemble Learning for Countermeasure of Audio Replay Spoofing Attack in ASVspoof2017. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERSPEECH ![In: Interspeech 2017, 18th Annual Conference of the International Speech Communication Association, Stockholm, Sweden, August 20-24, 2017, pp. 87-91, 2017, ISCA. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Ayaka Oshima, Koji Okada |
Estimation of Risk Countermeasure Effects Based Upon Project-Behavior Simulation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIAI-AAI ![In: 6th IIAI International Congress on Advanced Applied Informatics, IIAI-AAI 2017, Hamamatsu, Japan, July 9-13, 2017, pp. 307-312, 2017, IEEE Computer Society, 978-1-5386-0621-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Hajer Boujezza, Hella Kaffel-Ben Ayed, Leïla Azouz Saïdane |
Protection of IoT transaction using ID-KEM based on three-pass protocol countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017, Valencia, Spain, June 26-30, 2017, pp. 423-428, 2017, IEEE, 978-1-5090-4372-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Tetsuji Takada |
Authentication Shutter: Alternative Countermeasure against Password Reuse Attack by Availability Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 41:1-41:9, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Jaroslaw Bernacki, Marek Klonowski, Piotr Syga |
Some Remarks about Tracing Digital Cameras - Faster Method and Usable Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017., pp. 343-350, 2017, SciTePress, 978-989-758-259-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Azim Zaliha Abd Aziz, Hong Wei, James M. Ferryman |
Face anti-spoofing countermeasure: Efficient 2D materials classification using polarization imaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWBF ![In: 5th International Workshop on Biometrics and Forensics, IWBF 2017, Coventry, United Kingdom, April 4-5, 2017, pp. 1-6, 2017, IEEE, 978-1-5090-5791-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Jayamine Alupotha, Sanduni Prasadi, Janaka Alawatugoda 0001, Roshan G. Ragel, Mohamed Fawsan |
Implementing a proven-secure and cost-effective countermeasure against the compression ratio info-leak mass exploitation (CRIME) attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIIS ![In: 2017 IEEE International Conference on Industrial and Information Systems, ICIIS 2017, Peradeniya, Sri Lanka, December 15-16, 2017, pp. 1-6, 2017, IEEE, 978-1-5386-1674-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Yingchun Chen, Yan Qiu |
Simulation-based effectiveness analysis of acoustic countermeasure for ship formation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSAI ![In: 4th International Conference on Systems and Informatics, ICSAI 2017, Hangzhou, China, November 11-13, 2017, pp. 756-761, 2017, IEEE, 978-1-5386-1107-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Peng Li, Huayi Fang, Xiang Liu, Baijian Yang 0001 |
A countermeasure against relay attack in NFC payment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of the Second International Conference on Internet of things and Cloud Computing, ICC 2017, Cambridge, United Kingdom, March 22-23, 2017, pp. 96:1-96:5, 2017, ACM. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Kanako Konno, Kenya Dan, Naoya Kitagawa |
A Spoofed E-Mail Countermeasure Method by Scoring the Reliability of DKIM Signature Using Communication Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 2, pp. 43-48, 2017, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Tommy Chin, Kaiqi Xiong, Mohamed Rahouti |
SDN-Based Kernel Modular Countermeasure for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings, pp. 270-290, 2017, Springer, 978-3-319-78812-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Gustavo Gonzalez Granadillo, Elena Doynikova, Igor V. Kotenko, Joaquín García-Alfaro |
Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPS ![In: Foundations and Practice of Security - 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers, pp. 293-302, 2017, Springer, 978-3-319-75649-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | M. K. Dubey, Navneet Gaba, S. S. Bedi |
FASER128: Cryptanalysis and Its Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMC ![In: Mathematics and Computing - Third International Conference, ICMC 2017, Haldia, India, January 17-21, 2017, Proceedings, pp. 120-131, 2017, 978-981-10-4641-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Qiang Xing, Weigang Zhu, Xin Jia |
Intelligent countermeasure design of radar working-modes unknown. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSPCC ![In: 2017 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Xiamen, China, October 22-25, 2017, pp. 1-5, 2017, IEEE, 978-1-5386-3142-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Xiaojie Dong, Minjian Yu, Shuai Song, Yaqian Liu |
Study on the countermeasure of air combat command and guide based on computer games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA ![In: IEEE International Conference on Agents, ICA 2017, Beijing, China, July 6-9, 2017, pp. 99-100, 2017, IEEE, 978-1-5386-0768-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Kazuhide Fukushima, Rui Xu 0006, Shinsaku Kiyomoto, Naofumi Homma |
Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/BigDataSE/ICESS ![In: 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, pp. 1032-1037, 2017, IEEE Computer Society, 978-1-5090-4906-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Takamichi Saito, Ryohei Hosoya, Koki Yasuda, Kazushi Takahashi, Yuta Tsunoda, Kazuhisa Tanabe, Masayuki Taneoka, Satoshi Yashiro |
Proposal and Implementation of a Countermeasure Against Event Tracking on the Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMIS ![In: Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2017), Torino, Italy, 10-12 July 2017., pp. 435-444, 2017, Springer, 978-3-319-61541-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Chenguang Wang 0003, Ming Yan, Yici Cai, Qiang Zhou 0001, Jianlei Yang 0001 |
Power Profile Equalizer: A Lightweight Countermeasure against Side-Channel Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCD ![In: 2017 IEEE International Conference on Computer Design, ICCD 2017, Boston, MA, USA, November 5-8, 2017, pp. 305-312, 2017, IEEE Computer Society, 978-1-5386-2254-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee |
Highly secured state-shift local clock circuit to countermeasure against side channel attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2017, Baltimore, MD, USA, May 28-31, 2017, pp. 1-4, 2017, IEEE, 978-1-4673-6853-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Sadegh Attari, Aein Rezaei Shahmirzadi, Mahmoud Salmasizadeh, Iman Gholampour |
Finite State Machine Based Countermeasure for Cryptographic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCISC ![In: 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, Shiraz, Iran, September 6-7, 2017, pp. 58-63, 2017, IEEE, 978-1-5386-6560-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | SeungJae Na, DongYeop Hwang, Woonseob Shin, Ki-Hyung Kim |
Scenario and countermeasure for replay attack using join request messages in LoRaWAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: 2017 International Conference on Information Networking, ICOIN 2017, Da Nang, Vietnam, January 11-13, 2017, pp. 718-720, 2017, IEEE, 978-1-5090-5124-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | JungWoon Lee, DongYeop Hwang, Jihong Park, Ki-Hyung Kim |
Risk analysis and countermeasure for bit-flipping attack in LoRaWAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: 2017 International Conference on Information Networking, ICOIN 2017, Da Nang, Vietnam, January 11-13, 2017, pp. 549-551, 2017, IEEE, 978-1-5090-5124-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Jia-Wei Ma, Xuguang Guan, Tong Zhou, Tao Sun |
A new countermeasure against side channel attack for HMAC-SM3 hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASICON ![In: 12th IEEE International Conference on ASIC, ASICON 2017, Guiyang, China, October 25-28, 2017, pp. 327-330, 2017, IEEE, 978-1-5090-6625-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Gorby Kabasele Ndonda, Ramin Sadre |
A low-delay SDN-based countermeasure to eavesdropping attacks in industrial control systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NFV-SDN ![In: 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2017, Berlin, Germany, November 6-8, 2017, pp. 1-7, 2017, IEEE, 978-1-5386-3285-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Reza Mohammadi 0003, Reza Javidan, Manijeh Keshtgari, Mauro Conti, Chhagan Lal |
Practical extensions to countermeasure DoS attacks in software defined networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NFV-SDN ![In: 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2017, Berlin, Germany, November 6-8, 2017, pp. 1-6, 2017, IEEE, 978-1-5386-3285-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|