Sfoglia per Autore  

opzioni
Mostrati risultati da 61 a 80 di 141
Titolo Data di pubblicazione Autori File
Preface of the Proceedings of the First Workshop on Cryptography and Security in Computing Systems (CS2 2014) 1-gen-2014 PELOSI, GERARDO +
Foreword - Proceedings of the 1st Workshop on Cryptography and Security in Computing Systems, CS2 2014 1-gen-2014 PELOSI, GERARDO +
Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO
Design Space Extension for Secure Implementation of Block Ciphers 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
Security Challenges in Building Automation and SCADA 1-gen-2014 ANTONINI, ALESSIOBARENGHI, ALESSANDROPELOSI, GERARDO +
Towards transparently tackling functionality and performance issues across different OpenCL platforms 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Security Integration in Medical Device Design: Extension of an Automated Biomedical Engineering Design Methodology 1-gen-2014 PELOSI, GERARDOAGOSTA, GIOVANNI +
Protecting access confidentiality with data distribution and swapping 1-gen-2014 PELOSI, GERARDO +
On the Security of Partially Masked Software Implementations 1-gen-2014 BARENGHI, ALESSANDROPELOSI, GERARDO
On Task Assignment in Data Intensive Scalable Computing 1-gen-2014 AGOSTA, GIOVANNIPELOSI, GERARDO +
Snake: an End-to-End Encrypted Online Social Network 1-gen-2014 BARENGHI, ALESSANDRODI FEDERICO, ALESSANDROPELOSI, GERARDO +
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems 1-gen-2015 PELOSI, GERARDOAGOSTA, GIOVANNIBARENGHI, ALESSANDRO +
Shuffle Index: Efficient and Private Access to Outsourced Data 1-gen-2015 PELOSI, GERARDO +
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges 1-gen-2015 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEFUGINI, MARIAGRAZIAPELOSI, GERARDO
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 1-gen-2015 BARENGHI, ALESSANDRODI FEDERICO, ALESSANDROPELOSI, GERARDO +
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks 1-gen-2015 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions 1-gen-2015 AGOSTA, GIOVANNIANTONINI, ALESSIOBARENGHI, ALESSANDROPELOSI, GERARDO +
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives 1-gen-2015 AGOSTA, GIOVANNIBARENGHI, ALESSANDRODI FEDERICO, ALESSANDROPELOSI, GERARDO
Fault Sensitivity Analysis at Design Time 1-gen-2015 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPALOMBA, ANDREAPELOSI, GERARDO
Mostrati risultati da 61 a 80 di 141
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile