Sfoglia per Autore  

Opzioni
Mostrati risultati da 51 a 100 di 148
Titolo Data di pubblicazione Autori File
Secure and Efficient Design of Block Cipher Implementations on Microcontrollers 1-gen-2013 BARENGHI, ALESSANDROPELOSI, GERARDOTERRANEO, FEDERICO
Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs 1-gen-2013 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques 1-gen-2013 ANTONINI, ALESSIOBARENGHI, ALESSANDROPELOSI, GERARDO
Distributed Shuffling for Preserving Access Confidentiality 1-gen-2013 PELOSI, GERARDO +
Supporting Concurrency and Multiple Indexes in Private Access to Outsourced Data 1-gen-2013 PELOSI, GERARDO +
Authentication Method 1-gen-2014 PELOSI, GERARDO +
Automated Methodology Integrating Security and Privacy in the Design Process of Medical Devices 1-gen-2014 PELOSI, GERARDOAGOSTA, GIOVANNI +
Extending the Design Space for Secure Embedded System Design 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
Preface of the Proceedings of the First Workshop on Cryptography and Security in Computing Systems (CS2 2014) 1-gen-2014 PELOSI, GERARDO +
Snake: an End-to-End Encrypted Online Social Network 1-gen-2014 BARENGHI, ALESSANDRODI FEDERICO, ALESSANDROPELOSI, GERARDO +
Foreword - Proceedings of the 1st Workshop on Cryptography and Security in Computing Systems, CS2 2014 1-gen-2014 PELOSI, GERARDO +
Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO
Symmetric key encryption acceleration on heterogeneous many-core architectures 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Design Space Extension for Secure Implementation of Block Ciphers 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
Security Integration in Medical Device Design: Extension of an Automated Biomedical Engineering Design Methodology 1-gen-2014 PELOSI, GERARDOAGOSTA, GIOVANNI +
Security Challenges in Building Automation and SCADA 1-gen-2014 ANTONINI, ALESSIOBARENGHI, ALESSANDROPELOSI, GERARDO +
On Task Assignment in Data Intensive Scalable Computing 1-gen-2014 AGOSTA, GIOVANNIPELOSI, GERARDO +
On the Security of Partially Masked Software Implementations 1-gen-2014 BARENGHI, ALESSANDROPELOSI, GERARDO
Towards transparently tackling functionality and performance issues across different OpenCL platforms 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis 1-gen-2014 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Protecting access confidentiality with data distribution and swapping 1-gen-2014 PELOSI, GERARDO +
Cyber-Security Analysis and Evaluation for Smart Home Management Solutions 1-gen-2015 AGOSTA, GIOVANNIANTONINI, ALESSIOBARENGHI, ALESSANDROPELOSI, GERARDO +
Foreword - Proceedings of the Second Workshop on Cryptography and Security in Computing Systems 1-gen-2015 PELOSI, GERARDOAGOSTA, GIOVANNIBARENGHI, ALESSANDRO +
The MEET Approach: Securing Cryptographic Embedded Software Against Side Channel Attacks 1-gen-2015 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Information Leakage Chaff: Feeding Red Herrings to Side Channel Attackers 1-gen-2015 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives 1-gen-2015 AGOSTA, GIOVANNIBARENGHI, ALESSANDRODI FEDERICO, ALESSANDROPELOSI, GERARDO
Trace-based Schedulability Analysis to Enhance Passive Side-Channel Attack Resilience of Embedded Software 1-gen-2015 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDOSCANDALE, MICHELE
Fault Sensitivity Analysis at Design Time 1-gen-2015 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPALOMBA, ANDREAPELOSI, GERARDO
Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof? 1-gen-2015 BARENGHI, ALESSANDRODI FEDERICO, ALESSANDROPELOSI, GERARDO +
Computer Security Anchors in Smart Grids: The Smart Metering Scenario and Challenges 1-gen-2015 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEFUGINI, MARIAGRAZIAPELOSI, GERARDO
Shuffle Index: Efficient and Private Access to Outsourced Data 1-gen-2015 PELOSI, GERARDO +
Foreword - Proceedings of the Third Workshop on Cryptography and Security in Computing Systems 1-gen-2016 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
V2I Cooperation for Traffic Management with SafeCOP 1-gen-2016 AGOSTA, GIOVANNIBARENGHI, ALESSANDROBRANDOLESE, CARLOFORNACIARI, WILLIAMPELOSI, GERARDO +
A privacy-preserving encrypted OSN with stateless server interaction: the Snake design 1-gen-2016 BARENGHI, ALESSANDRODI FEDERICO, ALESSANDROPELOSI, GERARDO +
Access control for the shuffle index 1-gen-2016 PELOSI, GERARDO +
Automated instantiation of side-channel attacks countermeasures for software cipher implementations 1-gen-2016 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO
The M2DC Project: Modular Microserver DataCentre 1-gen-2016 AGOSTA, GIOVANNIBRANDOLESE, CARLOFORNACIARI, WILLIAMPELOSI, GERARDO +
A note on fault attacks against deterministic signature schemes 1-gen-2016 BARENGHI, ALESSANDROPELOSI, GERARDO
A fault-based secret key retrieval method for ECDSA: analysis and countermeasure 1-gen-2016 BARENGHI, ALESSANDROBREVEGLIERI, LUCA ODDONEPELOSI, GERARDO +
Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel 1-gen-2016 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO +
Foreword - Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems 1-gen-2017 AGOSTA, GIOVANNIBARENGHI, ALESSANDROPELOSI, GERARDO
An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers 1-gen-2017 BARENGHI, ALESSANDROPELOSI, GERARDO
Safe Cooperative CPS: A V2I Traffic Management scenario in the SafeCOP project 1-gen-2017 AGOSTA, GIOVANNIBARENGHI, ALESSANDROBRANDOLESE, CARLOFORNACIARI, WILLIAMPELOSI, GERARDO +
A dynamic tree-based data structure for access privacy in the cloud 1-gen-2017 PELOSI, GERARDO +
M2DC – Modular Microserver DataCentre with Heterogeneous Hardware 1-gen-2017 AGOSTA, GIOVANNIBARENGHI, ALESSANDROBRANDOLESE, CARLOFORNACIARI, WILLIAMPELOSI, GERARDO +
Data Centres for IoT applications: the M2DC Approach 1-gen-2017 AGOSTA, GIOVANNIBRANDOLESE, CARLOFORNACIARI, WILLIAMPELOSI, GERARDO +
A Security Audit of the OpenPGP Format 1-gen-2017 A. BarenghiN. MainardiG. Pelosi
A Novel Regular Format for X.509 Digital Certificates 1-gen-2018 BARENGHI, ALESSANDROMAINARDI, NICHOLASPELOSI, GERARDO
Foreword -Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems 1-gen-2018 G. AgostaA. BarenghiG. Pelosi +
Mostrati risultati da 51 a 100 di 148
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile