Sfoglia per Autore  

Opzioni
Mostrati risultati da 61 a 80 di 148
Titolo Data di pubblicazione Autori File
Symmetric key encryption acceleration on heterogeneous many-core architectures 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Security Challenges in Building Automation and SCADA 1-gen-2014 ANTONINI, ALESSIOBARENGHI, ALESSANDROPELOSI, GERARDO +
Preface of the Proceedings of the First Workshop on Cryptography and Security in Computing Systems (CS2 2014) 1-gen-2014 PELOSI, GERARDO +
Towards transparently tackling functionality and performance issues across different OpenCL platforms 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Protecting access confidentiality with data distribution and swapping 1-gen-2014 PELOSI, GERARDO +
On the Security of Partially Masked Software Implementations 1-gen-2014 BARENGHI, ALESSANDROPELOSI, GERARDO
On Task Assignment in Data Intensive Scalable Computing 1-gen-2014 AGOSTA, GIOVANNIPELOSI, GERARDO +
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Foreword - Proceedings of the 1st Workshop on Cryptography and Security in Computing Systems, CS2 2014 1-gen-2014 PELOSI, GERARDO +
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Snake: an End-to-End Encrypted Online Social Network 1-gen-2014 BARENGHI, ALESSANDRODI FEDERICO, ALESSANDROPELOSI, GERARDO +
Design Space Extension for Secure Implementation of Block Ciphers 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges 1-gen-2015 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEFUGINI, MARIAGRAZIAPELOSI, GERARDO
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives 1-gen-2015 AGOSTA, GIOVANNIBARENGHI, ALESSANDRODI FEDERICO, ALESSANDROPELOSI, GERARDO
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems 1-gen-2015 PELOSI, GERARDOAGOSTA, GIOVANNIBARENGHI, ALESSANDRO +
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 1-gen-2015 BARENGHI, ALESSANDRODI FEDERICO, ALESSANDROPELOSI, GERARDO +
Fault Sensitivity Analysis at Design Time 1-gen-2015 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPALOMBA, ANDREAPELOSI, GERARDO
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions 1-gen-2015 AGOSTA, GIOVANNIANTONINI, ALESSIOBARENGHI, ALESSANDROPELOSI, GERARDO +
Information Leakage Chaff: Feeding Red Herrings to Side Channel Attackers 1-gen-2015 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Shuffle Index: Efficient and Private Access to Outsourced Data 1-gen-2015 PELOSI, GERARDO +
Mostrati risultati da 61 a 80 di 148
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile