Sfoglia per Autore  

Opzioni
Mostrati risultati da 21 a 40 di 153
Titolo Data di pubblicazione Autori File
Improving first order differential power attacks through Digital Signal Processing 1-gen-2010 BARENGHI, ALESSANDROPELOSI, GERARDO +
Method for Establishing a Communication between Two Devices 1-gen-2010 PELOSI, GERARDO +
Countermeasures against fault attacks on software implemented AES: effectiveness and cost 1-gen-2010 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Low voltage fault attacks to AES 1-gen-2010 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Encryption-based Policy Enforcement for Cloud Storage 1-gen-2010 PELOSI, GERARDO +
Fault attack on AES with single-bit induced faults 1-gen-2010 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Efficient and Private Access to Outsourced Data 1-gen-2011 PELOSI, GERARDO +
Selective Exchange of Confidential Data in the Outsourcing Scenario 1-gen-2011 PELOSI, GERARDO +
Supporting Concurrency in Private Data Outsourcing 1-gen-2011 PELOSI, GERARDO +
Secure Audit Logs 1-gen-2011 PELOSI, GERARDO
Use of Bilinear Mappings in Cryptographic Applications 1-gen-2011 PELOSI, GERARDO +
Security and Privacy in Smart Grid Infrastructures 1-gen-2011 BARENGHI, ALESSANDROPELOSI, GERARDO
Smart metering in power grids: Application scenarios and security 1-gen-2011 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEFUGINI, MARIAGRAZIAPELOSI, GERARDO
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults 1-gen-2011 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Information Leakage Discovery Techniques to Enhance Secure Chip Design 1-gen-2011 BARENGHI, ALESSANDROPELOSI, GERARDO +
Computation of a Modular Multiplication with an Electronic Circuit 1-gen-2011 PELOSI, GERARDO +
Secure Index 1-gen-2011 PELOSI, GERARDO
Injection Technologies for Fault Attacks on Microprocessors 1-gen-2012 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution 1-gen-2012 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
Exploiting Bit-level Parallelism in GPGPUs: a Case Study on KEELOQ Exhaustive Key Search Attack 1-gen-2012 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO
Mostrati risultati da 21 a 40 di 153
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile