Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cases/wess2010.bht:"
@inproceedings{DBLP:conf/cases/BarenghiBKPR10, author = {Alessandro Barenghi and Luca Breveglieri and Israel Koren and Gerardo Pelosi and Francesco Regazzoni}, title = {Countermeasures against fault attacks on software implemented {AES:} effectiveness and cost}, booktitle = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS} 2010, Scottsdale, AZ, USA, October 24, 2010}, pages = {7}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873548.1873555}, doi = {10.1145/1873548.1873555}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cases/BarenghiBKPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/BathenD10, author = {Luis Angel D. Bathen and Nikil D. Dutt}, title = {PoliMakE: a policy making engine for secure embedded software execution on chip-multiprocessors}, booktitle = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS} 2010, Scottsdale, AZ, USA, October 24, 2010}, pages = {2}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873548.1873550}, doi = {10.1145/1873548.1873550}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cases/BathenD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/BhasinGFSD10, author = {Shivam Bhasin and Sylvain Guilley and Florent Flament and Nidhal Selmane and Jean{-}Luc Danger}, title = {Countering early evaluation: an approach towards robust dual-rail precharge logic}, booktitle = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS} 2010, Scottsdale, AZ, USA, October 24, 2010}, pages = {6}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873548.1873554}, doi = {10.1145/1873548.1873554}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cases/BhasinGFSD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/EbeidL10, author = {Nevine Maurice Ebeid and Rob Lambert}, title = {A new {CRT-RSA} algorithm resistant to powerful fault attacks}, booktitle = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS} 2010, Scottsdale, AZ, USA, October 24, 2010}, pages = {8}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873548.1873556}, doi = {10.1145/1873548.1873556}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cases/EbeidL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/FiorinFPC10, author = {Leandro Fiorin and Alberto Ferrante and Konstantinos Padarnitsas and Stefano Carucci}, title = {Hardware-assisted security enhanced Linux in embedded systems: a proposal}, booktitle = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS} 2010, Scottsdale, AZ, USA, October 24, 2010}, pages = {3}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873548.1873551}, doi = {10.1145/1873548.1873551}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cases/FiorinFPC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/HuffmireLBIVTSK10, author = {Ted Huffmire and Timothy E. Levin and Michael Bilzor and Cynthia E. Irvine and Jonathan Valamehr and Mohit Tiwari and Timothy Sherwood and Ryan Kastner}, title = {Hardware trust implications of 3-D integration}, booktitle = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS} 2010, Scottsdale, AZ, USA, October 24, 2010}, pages = {1}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873548.1873549}, doi = {10.1145/1873548.1873549}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cases/HuffmireLBIVTSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/IdrissaAFF10, author = {Abdourhamane Idrissa and Alain Aubert and Thierry Fournel and Viktor Fischer}, title = {Secure protocols for serverless remote product authentication}, booktitle = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS} 2010, Scottsdale, AZ, USA, October 24, 2010}, pages = {11}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873548.1873559}, doi = {10.1145/1873548.1873559}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cases/IdrissaAFF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/LukovicC10, author = {Slobodan Lukovic and Nikolaos Christianos}, title = {Enhancing network-on-chip components to support security of processing elements}, booktitle = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS} 2010, Scottsdale, AZ, USA, October 24, 2010}, pages = {12}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873548.1873560}, doi = {10.1145/1873548.1873560}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cases/LukovicC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/MateosG10, author = {Edgar Mateos and Catherine H. Gebotys}, title = {A new correlation frequency analysis of the side channel}, booktitle = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS} 2010, Scottsdale, AZ, USA, October 24, 2010}, pages = {4}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873548.1873552}, doi = {10.1145/1873548.1873552}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cases/MateosG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/MerliSE10, author = {Dominik Merli and Frederic Stumpf and Claudia Eckert}, title = {Improving the quality of ring oscillator PUFs on FPGAs}, booktitle = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS} 2010, Scottsdale, AZ, USA, October 24, 2010}, pages = {9}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873548.1873557}, doi = {10.1145/1873548.1873557}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cases/MerliSE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/SinhaCS10, author = {Ambuj Sinha and Zhimin Chen and Patrick Schaumont}, title = {A comprehensive analysis of performance and side-channel-leakage of {AES} {SBOX} implementations in embedded software}, booktitle = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS} 2010, Scottsdale, AZ, USA, October 24, 2010}, pages = {5}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873548.1873553}, doi = {10.1145/1873548.1873553}, timestamp = {Mon, 28 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cases/SinhaCS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/SzilagyiK10, author = {Christopher Szilagyi and Philip Koopman}, title = {Low cost multicast authentication via validity voting in time-triggered embedded control networks}, booktitle = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS} 2010, Scottsdale, AZ, USA, October 24, 2010}, pages = {10}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873548.1873558}, doi = {10.1145/1873548.1873558}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cases/SzilagyiK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cases/2010wess, title = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS} 2010, Scottsdale, AZ, USA, October 24, 2010}, publisher = {{ACM}}, year = {2010}, isbn = {978-1-4503-0078-0}, timestamp = {Mon, 14 Nov 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cases/2010wess.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.