The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for countermeasure with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-2000 (15) 2001-2002 (25) 2003 (20) 2004 (35) 2005 (65) 2006 (64) 2007 (47) 2008 (70) 2009 (50) 2010 (28) 2011 (27) 2012 (43) 2013 (37) 2014 (34) 2015 (47) 2016 (40) 2017 (60) 2018 (54) 2019 (73) 2020 (83) 2021 (77) 2022 (75) 2023 (62) 2024 (9)
Publication types (Num. hits)
article(395) book(1) incollection(4) inproceedings(735) phdthesis(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 472 occurrences of 223 keywords

Results
Found 1140 publication records. Showing 1140 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Pablo Rauzy, Sylvain Guilley Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
15Nicolas Moro, Karine Heydemann, Emmanuelle Encrenaz, Bruno Robisson Formal verification of a software countermeasure against instruction skip attacks. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
15Gustavo Gonzalez Granadillo, Christophe Ponchel, Gregory Blanc, Hervé Debar Combining Technical and Financial Impacts for Countermeasure Selection. Search on Bibsonomy AIDP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Darshana Jayasinghe, Roshan G. Ragel, Dhammika Elkaduwe Constant time encryption as a countermeasure against remote cache timing attacks. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
15Changlong Chen, Min Song 0002, Chunsheng Xin CoPD: a conjugate prior based detection scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Amir Moradi 0001 Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
15Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendörfer Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
15Aye Aung, Kah Chan Teh, Kwok Hung Li Detection and countermeasure of interference in slow FH/MFSK systems over fading channels. Search on Bibsonomy Phys. Commun. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Fei Shi, Weijie Liu 0005, Dongxu Jin, JooSeok Song A cluster-based countermeasure against blackhole attacks in MANETs. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rajesh G. Kavasseri Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation. Search on Bibsonomy DSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Daniel Vidal, Mario Lúcio Côrtes Fast and accurate solution for power estimation and DPA countermeasure design. Search on Bibsonomy PATMOS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Matthew Mayhew, Radu Muresan Modeling the effect of NMOS gate capacitance in an on-chip decoupling capacitor PAA countermeasure. Search on Bibsonomy MWSCAS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Avani Sharma, Rajbir Kaur Non-cryptographic Detection Approach and Countermeasure for JFDV Attack. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, Kyungtae Kang, Junbeom Hur A Privacy Threat in 4th Generation Mobile Telephony and Its Countermeasure. Search on Bibsonomy WASA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Sho Endo, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, Takafumi Aoki A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Satoshi Ohkawa, Hidekazu Nishimura, Yoshiaki Ohkami Decomposition Analysis Resolution Process (DAR) of Systems Engineering Applied to Development of Countermeasure on Leakage of Engine Head-Gasket. Search on Bibsonomy PLM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Takao Okubo, Yoshiro Wataguchi, Nobuyuki Kanaya Threat and countermeasure patterns for cloud computing. Search on Bibsonomy RePa The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Pablo Rauzy, Sylvain Guilley Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security. Search on Bibsonomy PPREW@POPL The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Hamad Marzouqi, Mahmoud Al-Qutayri, K. Salati A fault attack countermeasure for ECC processor using One-Hot RSD encoding. Search on Bibsonomy ICECS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura A Countermeasure Recommendation System against Targeted Attacks with Preserving Continuity of Internal Networks. Search on Bibsonomy COMPSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Taesung Kim, Sungjun Ahn, Seungkwang Lee, Dooho Choi Function Masking: A New Countermeasure Against Side Channel Attack. Search on Bibsonomy WISA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Jheng-Hao Ye, Szu-Han Huang, Ming-Der Shieh An efficient countermeasure against power attacks for ECC over GF(p). Search on Bibsonomy ISCAS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Moshe Avital, Alexander Fish Secured Dual Mode Logic (DML) as a countermeasure against Differential Power Analysis. Search on Bibsonomy ISCAS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Amir Moradi 0001 Wire-Tap Codes as Side-Channel Countermeasure - - An FPGA-Based Experiment -. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Mostafa M. I. Taha, Patrick Schaumont Side-channel countermeasure for SHA-3 at almost-zero area overhead. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Minoru Kuribayashi Countermeasure to non-linear collusion attacks on spread spectrum fingerprinting. Search on Bibsonomy ISITA The full citation details ... 2014 DBLP  BibTeX  RDF
15Samah Mohamed Saeed, Sk Subidh Ali, Ozgur Sinanoglu, Ramesh Karri Test-mode-only scan attack and countermeasure for contemporary scan architectures. Search on Bibsonomy ITC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Zhaogeng Li, Jun Bi Interest cash: an application-based countermeasure against interest flooding for dynamic content in named data networking. Search on Bibsonomy CFI The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay Destroying Fault Invariant with Randomization - A Countermeasure for AES Against Differential Fault Attacks. Search on Bibsonomy CHES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Zeleng Zhuang, Jiachao Chen, Haosheng Zhang A Countermeasure for DES with Both Rotating Masks and Secured S-Boxes. Search on Bibsonomy CIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Tadeusz Sawik Selection of optimal countermeasure portfolio in IT security planning. Search on Bibsonomy Decis. Support Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Fei Shi, Weijie Liu 0005, Dongxu Jin, JooSeok Song A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology. Search on Bibsonomy Electron. Commer. Res. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Shugo Mikami, Hirotaka Yoshida, Dai Watanabe, Kazuo Sakiyama Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Alexis Bonnecaze, Pierre Liardet, Alexandre Venelli AES side-channel countermeasure using random tower field constructions. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Md. Iftekhar Salam, Hoon-Jae Lee 0001 Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory. Search on Bibsonomy J. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Câncio Monteiro, Yasuhiro Takahashi, Toshikazu Sekine Charge-sharing symmetric adiabatic logic in countermeasure against power analysis attacks at cell level. Search on Bibsonomy Microelectron. J. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Lip Yee Por Frequency of occurrence analysis attack and its countermeasure. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2013 DBLP  BibTeX  RDF
15Karine Heydemann, Nicolas Moro, Emmanuelle Encrenaz, Bruno Robisson Formal verification of a software countermeasure against instruction skip attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
15Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache Dynamic Countermeasure Against the Zero Power Analysis. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
15Pablo Rauzy, Sylvain Guilley Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
15Byeong-Hee Roh, Ju Wan Kim, Ki-Yeol Ryu, Jea-Tek Ryu A whitelist-based countermeasure scheme using a Bloom filter against SIP flooding attacks. Search on Bibsonomy Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Dejan Baca, Kai Petersen Countermeasure graphs for software security risk assessment: An action research. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Raúl Jiménez-Naharro, Juan Antonio Gómez Galán, Manuel Sanchez-Raya, Fernando Gómez-Bravo, Manuel Pedro Carrasco Design and Implementation of a New Real-Time Frequency Sensor Used as Hardware Countermeasure. Search on Bibsonomy Sensors The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, Dijiang Huang NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Neslihan Kose, Jean-Luc Dugelay Reflectance analysis based countermeasure technique to detect face mask attacks. Search on Bibsonomy DSP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Federico Alegre, Ravichander Vipperla, Asmaa Amehraye, Nicholas W. D. Evans A new speaker verification spoofing countermeasure based on local binary patterns. Search on Bibsonomy INTERSPEECH The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Sk Subidh Ali, Samah Mohamed Saeed, Ozgur Sinanoglu, Ramesh Karri New Scan-Based Attack Using Only the Test Mode and an Input Corruption Countermeasure. Search on Bibsonomy VLSI-SoC (Selected Papers) The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Takafumi Hibiki, Naofumi Homma, Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Takafumi Aoki Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure. Search on Bibsonomy COSADE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Khurram Shahzad, Steve Woodhead, Panos Bakalis A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing. Search on Bibsonomy SecNet The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Sachin Dilip Babar, Neeli R. Prasad, Ramjee Prasad Countermeasure for intelligent cluster-head jamming attack in wireless sensor network. Search on Bibsonomy PRISMS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Intesab Hussain, Soufiene Djahel, Dimitris Geneiatakis, Farid Naït-Abdesselam A lightweight countermeasure to cope with flooding attacks against session initiation protocol. Search on Bibsonomy WMNC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Changlong Chen, Min Song 0002, Chunsheng Xin A density based scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks. Search on Bibsonomy GLOBECOM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Mihail Cutitaru, Lee A. Belfore A partially-adiabatic energy-efficient logic family as a power analysis attack countermeasure. Search on Bibsonomy ACSSC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Makoto Kato, Saeko Matsuura A Dynamic Countermeasure Method to Android Malware by User Approval. Search on Bibsonomy COMPSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Sang-Yoon Chang, Yih-Chun Hu, Jerry T. Chiang, Soo-Young Chang Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming. Search on Bibsonomy MOBIWAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache Dynamic countermeasure against the Zero Power Analysis. Search on Bibsonomy ISSPIT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Katsunori Sato, Masaki Samejima, Ryôichi Sasaki Chance-Constrained Programming Method by Constraints Aggregation for Social Consensus Making on IT Risk Countermeasure. Search on Bibsonomy SMC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Cheon Sig Sin, Sanguk Lee, Jaehoon Kim Implementation of a signal generator to countermeasure the navigation signal interference. Search on Bibsonomy ICTC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Neslihan Kose, Jean-Luc Dugelay Shape and Texture Based Countermeasure to Protect Face Recognition Systems against Mask Attacks. Search on Bibsonomy CVPR Workshops The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Sk Subidh Ali, Samah Mohamed Saeed, Ozgur Sinanoglu, Ramesh Karri Scan attack in presence of mode-reset countermeasure. Search on Bibsonomy IOLTS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Neslihan Kose, Jean-Luc Dugelay Countermeasure for the protection of face recognition systems against mask attacks. Search on Bibsonomy FG The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Xiaoxin Cui, Rui Li, Wei Wei, Juan Gu, Xiaole Cui AHardware implementation of DES with combined countermeasure against DPA. Search on Bibsonomy ASICON The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Sung-Hwan Kim, Min-Woo Park, Jung-Ho Eom, Tai-Myoung Chung The Methodology for Hardening SCADA Security Using Countermeasure Ordering. Search on Bibsonomy MUE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Ganesh Ram Santhanam, Zachary J. Oster, Samik Basu 0001 Identifying a preferred countermeasure strategy for attack graphs. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Renato Menicocci, Alessandro Trifiletti, Francesco Bruno Trotta A logic level countermeasure against CPA side channel attacks on AES. Search on Bibsonomy MIXDES The full citation details ... 2013 DBLP  BibTeX  RDF
15Xia Zhu, Feng Zhou, Xiaoguang Liu, Guilin Zhang Modeling and simulation for signal interception of radar countermeasure reconnaissance sensor. Search on Bibsonomy FUSION The full citation details ... 2013 DBLP  BibTeX  RDF
15Amir Moradi 0001, Oliver Mischke Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure. Search on Bibsonomy ICICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Valentina Viduto, Carsten Maple, Wei Huang 0019, David López-Pérez A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem. Search on Bibsonomy Decis. Support Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Mustapha Hedabou Efficient Countermeasure for Securing the Eta Pairing Computation over Binary Fields. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2012 DBLP  BibTeX  RDF
15Xufei Zheng, Tao Li 0016, Yonghui Fang Strategy of fast and light-load cloud-based proactive benign worm countermeasure technology to contain worm propagation. Search on Bibsonomy J. Supercomput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon Multi-exponentiation algorithm based on binary GCD computation and its application to side-channel countermeasure. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Youhua Shi, Nozomu Togawa, Masao Yanagisawa Scan-Based Attack on AES through Round Registers and Its Countermeasure. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Shen Wang 0004, Xiamu Niu A Countermeasure against Double Compression Based Image Forensic. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Soufiene Djahel, Zonghua Zhang, Farid Naït-Abdesselam, John Murphy 0001 Fast and Efficient Countermeasure for MAC Layer Misbehavior in MANETs. Search on Bibsonomy IEEE Wirel. Commun. Lett. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan, Carl A. Gunter Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Jea-Tek Ryu, Byeong-Hee Roh, Ki-Yeol Ryu, Myungchul Yoon Detection And Countermeasure Scheme For Call-Disruption Attacks On SIP-Based Voip Services. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Fei Shi, JooSeok Song A Cluster-based Countermeasure against Media Access Control Layer Attacks in IEEE 802.11 Ad Hoc Networks. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Ali Jafarnia Jahromi, Ali Broumandan, John Nielsen, Gérard Lachapelle GPS spoofer countermeasure effectiveness based on signal strength, noise power, and C/N0 measurements. Search on Bibsonomy Int. J. Satell. Commun. Netw. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Kun Ma, Han Liang, Kaijie Wu 0001 Homomorphic Property-Based Concurrent Error Detection of RSA: A Countermeasure to Fault Attack. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Arpan Roy, Dong Seong Kim 0001, Kishor S. Trivedi Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger A First-Order Leak-Free Masking Countermeasure. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
15Md. Iftekhar Salam, Hoon-Jae Lee 0001 Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
15François Durvaux, Mathieu Renauld, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
15Ihor Vasyltsov, Gökay Saldamli Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography. Search on Bibsonomy Math. Comput. Model. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Chalee Vorakulpipat, Vasaka Visoottiviseth, Siwaruk Siwamogsatham Polite sender: A resource-saving spam email countermeasure based on sender responsibilities and recipient justifications. Search on Bibsonomy Comput. Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Pedro Malagón, Juan-Mariano de Goyeneche, Marina Zapater, José Manuel Moya, Zorana Bankovic Compiler Optimizations as a Countermeasure against Side-Channel Analysis in MSP430-Based Devices. Search on Bibsonomy Sensors The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Po-Chun Liu, Hsie-Chia Chang, Chen-Yi Lee A True Random-Based Differential Power Analysis Countermeasure Circuit for an AES Engine. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Jen-Wei Lee, Ju-Hung Hsiao, Hsie-Chia Chang, Chen-Yi Lee An Efficient DPA Countermeasure With Randomized Montgomery Operations for DF-ECC Processor. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Charles P. Pfleeger, Shari Lawrence Pfleeger Analyzing Computer Security - A Threat / Vulnerability / Countermeasure Approach. Search on Bibsonomy 2012   RDF
15Jie Li, Jun Bi, Jianping Wu, Wei Zhang 0040 A Multi-fence Countermeasure Based Inter-domain Source Address Validation Method. Search on Bibsonomy NCA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Panagiotis Sidiropoulos, Vasileios Mezaris, Ioannis Kompatsiaris Differential edit distance as a countermeasure to video scene ambiguity. Search on Bibsonomy MLSP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Maxime Nassar, Youssef Souissi, Sylvain Guilley, Jean-Luc Danger RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs. Search on Bibsonomy DATE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Shohreh Sharif Mansouri, Elena Dubrova An Architectural Countermeasure against Power Analysis Attacks for FSR-Based Stream Ciphers. Search on Bibsonomy COSADE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Guillaume Barbu, Philippe Andouard, Christophe Giraud 0001 Dynamic Fault Injection Countermeasure - A New Conception of Java Card Security. Search on Bibsonomy CARDIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache Low-Cost Countermeasure against RPA. Search on Bibsonomy CARDIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Stephane Fernandes Medeiros The Schedulability of AES as a Countermeasure against Side Channel Attacks. Search on Bibsonomy SPACE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Raúl Jiménez, Guillermo Feria, Juan Antonio Gómez Galán, Fernando Gómez-Bravo, Manuel Sanchez-Raya VLSI Implementation of digital frequency sensors as hardware countermeasure. Search on Bibsonomy ICECS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno Software Life-Extension: A New Countermeasure to Software Aging. Search on Bibsonomy ISSRE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15John Barron, Todd R. Andel, Yong Kim Dynamic Architectural Countermeasure to Protect RSA against Side Channel Power Analysis Attacks. Search on Bibsonomy ICISTM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Masaki Samejima, Ryôichi Sasaki Approximation method for chance-constrained programming of social consensus formation concerning IT risk countermeasure. Search on Bibsonomy SMC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 1140 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license