Sfoglia per Autore  

Opzioni
Mostrati risultati da 41 a 60 di 148
Titolo Data di pubblicazione Autori File
Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks 1-gen-2012 BARENGHI, ALESSANDROPELOSI, GERARDO +
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution 1-gen-2012 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
Exploiting Bit-level Parallelism in GPGPUs: a Case Study on KEELOQ Exhaustive Key Search Attack 1-gen-2012 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO
A Code Morphing Methodology to Automate Power Analysis Countermeasures 1-gen-2012 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO
Injection Technologies for Fault Attacks on Microprocessors 1-gen-2012 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Method of Processing Information to be Confidentially Transmitted 1-gen-2013 PELOSI, GERARDO +
Supporting Concurrency and Multiple Indexes in Private Access to Outsourced Data 1-gen-2013 PELOSI, GERARDO +
Design Time Engineering of Side Channel Resistant Cipher Implementations 1-gen-2013 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPALOMBA, ANDREAPELOSI, GERARDO +
Secure and Efficient Design of Block Cipher Implementations on Microcontrollers 1-gen-2013 BARENGHI, ALESSANDROPELOSI, GERARDOTERRANEO, FEDERICO
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs 1-gen-2013 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Drop-In Control Flow Hijacking Prevention through Dynamic Library Interception 1-gen-2013 BARENGHI, ALESSANDROPELOSI, GERARDO +
Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques 1-gen-2013 ANTONINI, ALESSIOBARENGHI, ALESSANDROPELOSI, GERARDO
A Fault Induction Technique Based on Voltage Underfeeding with Application to Attacks against AES and RSA 1-gen-2013 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Compiler-based Side Channel Vulnerability Analysis and Optimized Countermeasures Application 1-gen-2013 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
Distributed Shuffling for Preserving Access Confidentiality 1-gen-2013 PELOSI, GERARDO +
Authentication Method 1-gen-2014 PELOSI, GERARDO +
Automated Methodology Integrating Security and Privacy in the Design Process of Medical Devices 1-gen-2014 PELOSI, GERARDOAGOSTA, GIOVANNI +
Extending the Design Space for Secure Embedded System Design 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
Symmetric key encryption acceleration on heterogeneous many-core architectures 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Design Space Extension for Secure Implementation of Block Ciphers 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
Mostrati risultati da 41 a 60 di 148
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile