Sfoglia per Autore
Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks
2012-01-01 Barenghi, Alessandro; Pelosi, Gerardo; F., Regazzoni
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution
2012-01-01 Agosta, Giovanni; Barenghi, Alessandro; A., Parata; Pelosi, Gerardo
Exploiting Bit-level Parallelism in GPGPUs: a Case Study on KEELOQ Exhaustive Key Search Attack
2012-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo
A Code Morphing Methodology to Automate Power Analysis Countermeasures
2012-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo
Injection Technologies for Fault Attacks on Microprocessors
2012-01-01 Barenghi, Alessandro; G. M., Bertoni; Breveglieri, LUCA ODDONE; M., Pellicioli; Pelosi, Gerardo
Method of Processing Information to be Confidentially Transmitted
2013-01-01 G. M., Bertoni; L., Chen; P., Fragneto; K. A., Harrison; Pelosi, Gerardo
Supporting Concurrency and Multiple Indexes in Private Access to Outsourced Data
2013-01-01 S. D., Capitani; S., Foresti; S., Paraboschi; Pelosi, Gerardo; P., Samarati
Design Time Engineering of Side Channel Resistant Cipher Implementations
2013-01-01 Barenghi, Alessandro; Breveglieri, LUCA ODDONE; F., De Santis; F., Melzani; Palomba, Andrea; Pelosi, Gerardo
Secure and Efficient Design of Block Cipher Implementations on Microcontrollers
2013-01-01 Barenghi, Alessandro; Pelosi, Gerardo; Terraneo, Federico
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs
2013-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception
2013-01-01 Barenghi, Alessandro; Pelosi, Gerardo; F., Pozzi
Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques
2013-01-01 Antonini, Alessio; Barenghi, Alessandro; Pelosi, Gerardo
A Fault Induction Technique Based on Voltage Underfeeding with Application to Attacks against AES and RSA
2013-01-01 Barenghi, Alessandro; G., Bertoni; Breveglieri, LUCA ODDONE; Pelosi, Gerardo
Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application
2013-01-01 Agosta, Giovanni; Barenghi, Alessandro; M., Maggi; Pelosi, Gerardo
Distributed Shuffling for Preserving Access Confidentiality
2013-01-01 S., De Capitani Di Vimercati; S., Foresti; S., Paraboschi; Pelosi, Gerardo; P., Samarati
Authentication Method
2014-01-01 G. M., Bertoni; L., Chen; P., Fragneto; K., Harrison; Pelosi, Gerardo
Automated Methodology Integrating Security and Privacy in the Design Process of Medical Devices
2014-01-01 Pelosi, Gerardo; Agosta, Giovanni; I., Al Khatib
Extending the Design Space for Secure Embedded System Design
2014-01-01 Agosta, Giovanni; Barenghi, Alessandro; M., Maggi; Pelosi, Gerardo
Symmetric key encryption acceleration on heterogeneous many-core architectures
2014-01-01 Agosta, Giovanni; Barenghi, Alessandro; Pelosi, Gerardo; Scandale, Michele
Design Space Extension for Secure Implementation of Block Ciphers
2014-01-01 Agosta, Giovanni; Barenghi, Alessandro; M., Maggi; Pelosi, Gerardo
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile