The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for countermeasure with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-2000 (15) 2001-2002 (25) 2003 (20) 2004 (35) 2005 (65) 2006 (64) 2007 (47) 2008 (70) 2009 (50) 2010 (28) 2011 (27) 2012 (43) 2013 (37) 2014 (34) 2015 (47) 2016 (40) 2017 (60) 2018 (54) 2019 (73) 2020 (83) 2021 (77) 2022 (75) 2023 (62) 2024 (9)
Publication types (Num. hits)
article(395) book(1) incollection(4) inproceedings(735) phdthesis(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 472 occurrences of 223 keywords

Results
Found 1140 publication records. Showing 1140 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Martin Steinebach, Sascha Zmudzinski Countermeasure for collusion attacks against digital watermarking. Search on Bibsonomy Security, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Longjiang Yu, Xiamu Niu, Sheng-He Sun Print-and-scan model and the watermarking countermeasure. Search on Bibsonomy Image Vis. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Katsuyuki Okeya, Dong-Guk Han Cryptanalysis of Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15James E. Driskell, Brian Mullen The Efficacy of Naps as a Fatigue Countermeasure: A Meta-Analytic Integration. Search on Bibsonomy Hum. Factors The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim 0003, Ho Won Kim 0001, Kyoil Chung Collision Attack on XTR and a Countermeasure with a Fixed Pattern. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
15ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Wei-Chih Lien, Sung-Hyun Kim An Improved and Efficient Countermeasure against Power Analysis Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
15Craig Valli Honeypot technologies and their applicability as an internal countermeasure. Search on Bibsonomy Australian Computer, Network & Information Forensics Conference The full citation details ... 2005 DBLP  BibTeX  RDF
15Daniel Mesquita, Jean-Denis Techer, Lionel Torres, Gilles Sassatelli, Gaston Cambon, Michel Robert, Fernando Moraes 0001 A new hardware countermeasure for masking power signatures of crypto cores. Search on Bibsonomy ReCoSoC The full citation details ... 2005 DBLP  BibTeX  RDF
15Longjiang Yu, Xiamu Niu, Sheng-He Sun SVG-Based Countermeasure to Geometric Attack. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15François-Xavier Standaert, Eric Peeters, Jean-Jacques Quisquater On the Masking Countermeasure and Higher-Order Power Analysis Attacks. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Xinpeng Zhang 0001, Shuozhong Wang Invertibility attack against watermarking based on forged algorithm and a countermeasure. Search on Bibsonomy Pattern Recognit. Lett. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa Random Switching Logic: A Countermeasure against DPA based on Transition Probability. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
15You Sung Kang, KyungHee Oh, Byung-Ho Chung, Kyoil Chung, DaeHun Nyang Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF 802.11i, 802.1X, WPA, WLAN security
15François-Xavier Standaert, Siddika Berna Örs, Bart Preneel Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Seung-youn Lee, Myong-Chul Shin, Jae Sang Cha, Tai-Hoon Kim Threat Description for Developing Security Countermeasure. Search on Bibsonomy PCM (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Dong-Guk Han, Tetsuya Izu, Jongin Lim 0001, Kouichi Sakurai Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Dai Kashiwa, Eric Y. Chen, Hitoshi Fuji A countermeasure againstDDOS attacks using active networks technologies. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Katsuyuki Okeya, Kouichi Sakurai A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks. Search on Bibsonomy ITW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Katsuyuki Okeya, Tsuyoshi Takagi A More Flexible Countermeasure against Side Channel Attacks Using Window Method. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Width-w NAF, Fractional window, Pre-computation Table, Smart Card, Side Channel Attacks, Elliptic Curve Cryptosystem, Memory Constraint
15Andrei Malygin, Miodrag Filip, Enric Vilar Neural network implementation of a fade countermeasure controller for a VSAT link. Search on Bibsonomy Int. J. Satell. Commun. Netw. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Nedo Celandroni, Francesco Potorti Fade countermeasure using signal degradation estimation for demand-assignment satellite systems. Search on Bibsonomy J. Commun. Networks The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Younsun Kim, Sooyong Choi, Chulwoo You, Daesik Hong Effect of carrier frequency offset on the performance of an MC-CDMA system and its countermeasure using pulse shaping. Search on Bibsonomy ICC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
15Ari Juels, John G. Brainard Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. Search on Bibsonomy NDSS The full citation details ... 1999 DBLP  BibTeX  RDF
15Hisaji Fukuda Study of a Consultation System for Railway Safety Countermeasure. Search on Bibsonomy IEA/AIE The full citation details ... 1996 DBLP  BibTeX  RDF
15Amer A. Hassan, John E. Hershey, Jim E. Schroeder 0001 On a follower tone-jammer countermeasure technique. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
15Dieter Kreuer, Ansgar Radermacher, Sven Martin, Thomas Frach A prototype adaptive fade countermeasure system for TDMA operation at Ka band. Search on Bibsonomy PIMRC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
15John E. Hershey, Amy D. Michaelis Multiplexed synchronization: an electronic warfare countermeasure. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
11Aisha Fouad Bushager, Mark Zwolinski Modelling Smart Card Security Protocols in SystemC TLM. Search on Bibsonomy EUC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
11Liberios Vokorokos, Anton Baláz, Martin Chovanec Distributed Detection System of Security Intrusions Based on Partially Ordered Events and Patterns. Search on Bibsonomy Towards Intelligent Engineering and Information Technology The full citation details ... 2009 DBLP  DOI  BibTeX  RDF partially ordered events, distributed system, architecture, sensor, patterns, intrusion detection system
11Masana Murase, Kanna Shimizu, Wilfred Plouffe, Masaharu Sakamoto Effective implementation of the cell broadband engineTM isolation loader. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cell broadband engine(tm), encrypt-then-sign, substituted-ciphertext attack, multi-core, isolation
11Huajun Huang, Shaohong Zhong, Junshan Tan Browser-Side Countermeasures for Deceptive Phishing Attack. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Kuo-Hui Yeh, Nai-Wei Lo Improvement of an EPC Gen2 Compliant RFID Authentication Protocol. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Djordje Popovic, Giby Raphael, Robin Johnson, Gene Davis, Chris Berka Wearable Modular Device for Facilitation of Napping and Optimization of Post-nap Performance. Search on Bibsonomy HCI (16) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Nap, Sleep Deprivation, Performance Optimization, Wearable Devices
11Johan Åkerberg, Mats Björkman Exploring Network Security in PROFIsafe. Search on Bibsonomy SAFECOMP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Mohaned Kafi, Sylvain Guilley, Sandra Marcello, David Naccache Deconvolving Protected Signals. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Wolfgang Boehmer Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Matthias Biehl, Welf Löwe Automated Architecture Consistency Checking for Model Driven Software Development. Search on Bibsonomy QoSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Keewook Na, Yungeun Kim, Hojung Cha Acoustic Sensor Network-Based Parking Lot Surveillance System. Search on Bibsonomy EWSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Parking-lot surveillance system, Wireless sensor networks, Acoustic source localization
11Tugkan Tuglular, Can Arda Muftuoglu, Özgür Kaya, Fevzi Belli, Michael Linschulte GUI-Based Testing of Boundary Overflow Vulnerability. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Hao Yin, Wen Hui, Quan Miao, Zheng Li, Chuang Lin 0002 IVForensic: a digital forensics service platform for internet videos. Search on Bibsonomy ACM Multimedia The full citation details ... 2009 DBLP  DOI  BibTeX  RDF video fingerprint, digital forensics, digital video
11Zhimin Chen 0002, Syed Haider, Patrick Schaumont Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-Ta Chen Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Yongjin Kim ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DoS, DDoS, Traceback
11Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna. Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ESPAR antenna, key agreement, Cascade, information reconciliation
11Juan Carlos Martínez Santos, Yunsi Fei, Zhijie Jerry Shi PIFT: efficient dynamic information flow tracking using secure page allocation. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF control flow validation, security attacks, program validation
11Ahmadou Al Khary Séré, Julien Iguchi-Cartigny, Jean-Louis Lanet Automatic detection of fault attack and countermeasures. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Meiko Jensen, Lijun Liao, Jörg Schwenk The curse of namespaces in the domain of XML signature. Search on Bibsonomy SWS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF prefix-free canonicalization, signature wrapping, xml namespace injection, xml namespaces, xml signature
11Matthieu Rivain Securing RSA against Fault Analysis by Double Addition Chain Exponentiation. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Anna Sperotto, Gert Vliek, Ramin Sadre, Aiko Pras Detecting Spam at the Network Level. Search on Bibsonomy EUNICE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Riccardo Focardi, Flaminia L. Luccio, Graham Steel Blunting Differential Attacks on PIN Processing APIs. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Financial Cryptography, PIN Verification, Security APIs
11Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, Yue-Hsun Lin DepenDNS: Dependable Mechanism against DNS Cache Poisoning. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Markus Kasper, Timo Kasper, Amir Moradi 0001, Christof Paar Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11JeaHoon Park, KiSeok Bae, Sang-Jae Moon, Dooho Choi, You Sung Kang, JaeCheol Ha A new fault cryptanalysis on montgomery ladder exponentiation algorithm. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Montgomery ladder exponentiation algorithm, fault analysis attack, RSA, physical cryptanalysis
11XiaoFeng Wang 0001, Michael K. Reiter A multi-layer framework for puzzle-based denial-of-service defense. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Denial of service, Network protocols, Client puzzles
11Rafael Camilo Nunez, Juan G. Gonzalez, Gonzalo R. Arce, John P. Nolan Fast and Accurate Computation of the Myriad Filter via Branch-and-Bound Search. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Einoshin Suzuki Pitfalls for Categorizations of Objective Interestingness Measures for Rule Discovery. Search on Bibsonomy Statistical Implicative Analysis The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data bias, rule bias, expert bias, search bias, objective interestingness measure, rule discovery
11Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu, Li Xiao 0001, Leo C. Kempel Securing Sensor Nodes Against Side Channel Attacks. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Tianjie Cao, Peng Shen, Elisa Bertino Cryptanalysis of the LCSS RFID Authentication Protocol. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, RFID, Cryptanalysis
11János Bitó On the Markov modeling of digital communication channels. Search on Bibsonomy PIMRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang TCP covert timing channels: Design and detection. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Toru Nakanishi 0001, Nobuo Funabiki A short anonymously revocable group signature scheme from decision linear assumption. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anonymity, group signature, revocation
11Rajani Muraleedharan, Lisa Ann Osadciw Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cognitive Intelligence, Sensor Network, Ant Colony Optimization, Denial-of-Service
11Thomas Neubauer, Andreas Ekelhart, Stefan Fenz Interactive Selection of ISO 27001 Controls under Multiple Objectives. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Kun Peng, Feng Bao 0001 Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PBD shuffling, AAAP attack, optimisation, correction
11Ting Wang 0006, Ling Liu 0001 Butterfly: Protecting Output Privacy in Stream Mining. Search on Bibsonomy ICDE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Hiromitsu Kunishima, Hisao Koga, Osamu Muta, Yoshihiko Akaiwa On the Effect of Time-Domain Per-Subcarrier Equalization for Band-Limited OQAM Based Multi-Carrier Modulation Systems. Search on Bibsonomy VTC Spring The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Balázs Matuz, Gianluigi Liva, Cristina Parraga Niebla, Nuria Riera Diaz, Sandro Scalise, Pansoo Kim, Dae-Ig Chang, Ho-Jin Lee Link Layer Coding for DVB-S2 Interactive Satellite Services to Trains. Search on Bibsonomy VTC Spring The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Thomas Dreibholz, Erwin P. Rathgeb, Xing Zhou On Robustness and Countermeasures of Reliable Server Pooling Systems Against Denial of Service Attacks. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Robustness, Denial of Service, Attacks, Countermeasures, Reliable Server Pooling
11Liang Xie 0002, Hui Song, Trent Jaeger, Sencun Zhu A systematic approach for cell-phone worm containment. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cell phone, patch, turing test
11Kamal Harb, Changcheng Huang, Anand Srinivasan, Brian Cheng Intelligent Weather Aware Scheme for Satellite Systems. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Xuhua Ding, Wei Yu 0002, Ying Pan A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Maciej Nikodem DSA Signature Scheme Immune to the Fault Cryptanalysis. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Denis Réal, Vivien Dubois, Anne-Marie Guilloux, Frédéric Valette, M'hamed Drissi SCARE of an Unknown Hardware Feistel Implementation. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Yo Mashimo, Shintaro Ueda, Yasutaka Shinzaki, Hiroshi Shigeno Examination of Forwarding Obstruction Attacks in Structured Overlay Networks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Marcus Völp Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF information flow, language-based security
11Jintai Ding, Vivien Dubois, Bo-Yin Yang, Chia-Hsin Owen Chen, Chen-Mou Cheng Could SFLASH be Repaired?. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF signature, differential, multivariate cryptography, SFLASH
11David Canright, Lejla Batina A Very Compact "Perfectly Masked" S-Box for AES. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF composite Galois field, AES, DPA, S-box, masking
11Sergio Castillo-Perez, Joaquín García-Alfaro Anonymous Resolution of DNS Queries. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privacy Information Retrieval, Privacy, Anonymity, Domain Name System, IT Security
11Viktor Fischer, Florent Bernard, Nathalie Bochard, Michal Varchola Enhancing security of ring oscillator-based trng implemented in FPGA. Search on Bibsonomy FPL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Jin-Cherng Lin, Jan-Min Chen, Cheng-Hsiung Liu An Automatic Mechanism for Sanitizing Malicious Injection. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Konrad Rieck, Stefan Wahl, Pavel Laskov, Peter Domschitz, Klaus-Robert Müller A Self-learning System for Detection of Anomalous SIP Messages. Search on Bibsonomy IPTComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Kamal Harb, Changcheng Huang, Anand Srinivasan, Brian Cheng Intelligent Weather Systems with Fuzzy Logic Controller for Satellite Networks. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Fei Hu, Steve Wilson, Yang Xiao 0001 Correlation-Based Security in Time Synchronization of Sensor Networks. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Frédéric Amiel, Benoit Feix On the BRIP Algorithms Security for RSA. Search on Bibsonomy WISTP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF BRIP, modular multiplication and exponentiation, RSA, Power analysis, collision attacks
11Takashi Hamaguchi, Kazuhiro Takeda, Yukiyasu Shimada, Yoshihiro Hashimoto Plant Model Generation for Countermeasures Planning. Search on Bibsonomy KES (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Alarm Management, Countermeasures Planning, CE-matrices
11Jie Zhao 0003, Gangfeng Liu, Qinghu Han, Hegao Cai A Wheeling-Hopping Combination Scout Robot. Search on Bibsonomy ICIRA (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Scout Robot, the Five-shank Hopping Mechanism, Nonlinear Spring-mass Model
11Guillermo Horacio Ramirez Caceres, Yoshimi Teshigawara A Knowledge-Based Tool to Support Clear Relationship between Threats and Countermeasures Based on International Standards. Search on Bibsonomy APNOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Julien Francq, Jean-Baptiste Rigaud, Pascal Manet, Assia Tria, Arnaud Tisserand Error Detection for Borrow-Save Adders Dedicated to ECC Unit. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Arnaud Boscher, Helena Handschuh Masking Does Not Protect Against Differential Fault Attacks. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara Anonymous Fingerprinting for Predelivery of Contents. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh Enhanced power analysis attack using chosen message against RSA hardware implementations. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Keklik Alptekin Bayam, Siddika Berna Örs Differential Power Analysis resistant hardware implementation of the RSA cryptosystem. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Zhimin Chen 0002, Patrick Schaumont Slicing Up a Perfect Hardware Masking Scheme. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Yu Yao, Liqiong Wu, Fuxiang Gao, Wei Yang, Ge Yu 0001 A WAW Model of P2P-based Anti-worm. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Michael Backes 0001, Boris Köpf Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Mattia Monga LISABETH: automated content-based signature generator for zero-day polymorphic worms. Search on Bibsonomy SESS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF automatic content-based signature generation, intrusion detection, network security, polymorphic worms
11Fengjun Li, Bo Luo, Peng Liu 0005, Anna Cinzia Squicciarini, Dongwon Lee 0001, Chao-Hsien Chu Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attribute correlation attack, XML, privacy, information brokering
11Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF waveform matching, RSA, side-channel attacks, modular exponentiation, power-analysis attacks
11Liu Wenyin, Anthony Y. Fu, Xiaotie Deng Exposing Homograph Obfuscation Intentions by Coloring Unicode Strings. Search on Bibsonomy APWeb The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 1140 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license