Sfoglia per Autore  

Opzioni
Mostrati risultati da 61 a 80 di 144
Titolo Data di pubblicazione Autori File
Automated Methodology Integrating Security and Privacy in the Design Process of Medical Devices 1-gen-2014 PELOSI, GERARDOAGOSTA, GIOVANNI +
Protecting access confidentiality with data distribution and swapping 1-gen-2014 PELOSI, GERARDO +
Design Space Extension for Secure Implementation of Block Ciphers 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
Preface of the Proceedings of the First Workshop on Cryptography and Security in Computing Systems (CS2 2014) 1-gen-2014 PELOSI, GERARDO +
On Task Assignment in Data Intensive Scalable Computing 1-gen-2014 AGOSTA, GIOVANNIPELOSI, GERARDO +
Security Challenges in Building Automation and SCADA 1-gen-2014 ANTONINI, ALESSIOBARENGHI, ALESSANDROPELOSI, GERARDO +
Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO
On the Security of Partially Masked Software Implementations 1-gen-2014 BARENGHI, ALESSANDROPELOSI, GERARDO
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Snake: an End-to-End Encrypted Online Social Network 1-gen-2014 BARENGHI, ALESSANDRODI FEDERICO, ALESSANDROPELOSI, GERARDO +
Towards transparently tackling functionality and performance issues across different OpenCL platforms 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Security Integration in Medical Device Design: Extension of an Automated Biomedical Engineering Design Methodology 1-gen-2014 PELOSI, GERARDOAGOSTA, GIOVANNI +
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges 1-gen-2015 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEFUGINI, MARIAGRAZIAPELOSI, GERARDO
Shuffle Index: Efficient and Private Access to Outsourced Data 1-gen-2015 PELOSI, GERARDO +
Fault Sensitivity Analysis at Design Time 1-gen-2015 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPALOMBA, ANDREAPELOSI, GERARDO
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks 1-gen-2015 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions 1-gen-2015 AGOSTA, GIOVANNIANTONINI, ALESSIOBARENGHI, ALESSANDROPELOSI, GERARDO +
Information Leakage Chaff: Feeding Red Herrings to Side Channel Attackers 1-gen-2015 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems 1-gen-2015 PELOSI, GERARDOAGOSTA, GIOVANNIBARENGHI, ALESSANDRO +
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 1-gen-2015 BARENGHI, ALESSANDRODI FEDERICO, ALESSANDROPELOSI, GERARDO +
Mostrati risultati da 61 a 80 di 144
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile