Search dblp for Publications

export results for "toc:db/conf/cases/wess2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cases/BarenghiBKPR10,
  author       = {Alessandro Barenghi and
                  Luca Breveglieri and
                  Israel Koren and
                  Gerardo Pelosi and
                  Francesco Regazzoni},
  title        = {Countermeasures against fault attacks on software implemented {AES:}
                  effectiveness and cost},
  booktitle    = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS}
                  2010, Scottsdale, AZ, USA, October 24, 2010},
  pages        = {7},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1873548.1873555},
  doi          = {10.1145/1873548.1873555},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cases/BarenghiBKPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/BathenD10,
  author       = {Luis Angel D. Bathen and
                  Nikil D. Dutt},
  title        = {PoliMakE: a policy making engine for secure embedded software execution
                  on chip-multiprocessors},
  booktitle    = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS}
                  2010, Scottsdale, AZ, USA, October 24, 2010},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1873548.1873550},
  doi          = {10.1145/1873548.1873550},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cases/BathenD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/BhasinGFSD10,
  author       = {Shivam Bhasin and
                  Sylvain Guilley and
                  Florent Flament and
                  Nidhal Selmane and
                  Jean{-}Luc Danger},
  title        = {Countering early evaluation: an approach towards robust dual-rail
                  precharge logic},
  booktitle    = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS}
                  2010, Scottsdale, AZ, USA, October 24, 2010},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1873548.1873554},
  doi          = {10.1145/1873548.1873554},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/BhasinGFSD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/EbeidL10,
  author       = {Nevine Maurice Ebeid and
                  Rob Lambert},
  title        = {A new {CRT-RSA} algorithm resistant to powerful fault attacks},
  booktitle    = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS}
                  2010, Scottsdale, AZ, USA, October 24, 2010},
  pages        = {8},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1873548.1873556},
  doi          = {10.1145/1873548.1873556},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/EbeidL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/FiorinFPC10,
  author       = {Leandro Fiorin and
                  Alberto Ferrante and
                  Konstantinos Padarnitsas and
                  Stefano Carucci},
  title        = {Hardware-assisted security enhanced Linux in embedded systems: a proposal},
  booktitle    = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS}
                  2010, Scottsdale, AZ, USA, October 24, 2010},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1873548.1873551},
  doi          = {10.1145/1873548.1873551},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/FiorinFPC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/HuffmireLBIVTSK10,
  author       = {Ted Huffmire and
                  Timothy E. Levin and
                  Michael Bilzor and
                  Cynthia E. Irvine and
                  Jonathan Valamehr and
                  Mohit Tiwari and
                  Timothy Sherwood and
                  Ryan Kastner},
  title        = {Hardware trust implications of 3-D integration},
  booktitle    = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS}
                  2010, Scottsdale, AZ, USA, October 24, 2010},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1873548.1873549},
  doi          = {10.1145/1873548.1873549},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cases/HuffmireLBIVTSK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/IdrissaAFF10,
  author       = {Abdourhamane Idrissa and
                  Alain Aubert and
                  Thierry Fournel and
                  Viktor Fischer},
  title        = {Secure protocols for serverless remote product authentication},
  booktitle    = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS}
                  2010, Scottsdale, AZ, USA, October 24, 2010},
  pages        = {11},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1873548.1873559},
  doi          = {10.1145/1873548.1873559},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/IdrissaAFF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/LukovicC10,
  author       = {Slobodan Lukovic and
                  Nikolaos Christianos},
  title        = {Enhancing network-on-chip components to support security of processing
                  elements},
  booktitle    = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS}
                  2010, Scottsdale, AZ, USA, October 24, 2010},
  pages        = {12},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1873548.1873560},
  doi          = {10.1145/1873548.1873560},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cases/LukovicC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/MateosG10,
  author       = {Edgar Mateos and
                  Catherine H. Gebotys},
  title        = {A new correlation frequency analysis of the side channel},
  booktitle    = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS}
                  2010, Scottsdale, AZ, USA, October 24, 2010},
  pages        = {4},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1873548.1873552},
  doi          = {10.1145/1873548.1873552},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/MateosG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/MerliSE10,
  author       = {Dominik Merli and
                  Frederic Stumpf and
                  Claudia Eckert},
  title        = {Improving the quality of ring oscillator PUFs on FPGAs},
  booktitle    = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS}
                  2010, Scottsdale, AZ, USA, October 24, 2010},
  pages        = {9},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1873548.1873557},
  doi          = {10.1145/1873548.1873557},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/MerliSE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/SinhaCS10,
  author       = {Ambuj Sinha and
                  Zhimin Chen and
                  Patrick Schaumont},
  title        = {A comprehensive analysis of performance and side-channel-leakage of
                  {AES} {SBOX} implementations in embedded software},
  booktitle    = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS}
                  2010, Scottsdale, AZ, USA, October 24, 2010},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1873548.1873553},
  doi          = {10.1145/1873548.1873553},
  timestamp    = {Mon, 28 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/SinhaCS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/SzilagyiK10,
  author       = {Christopher Szilagyi and
                  Philip Koopman},
  title        = {Low cost multicast authentication via validity voting in time-triggered
                  embedded control networks},
  booktitle    = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS}
                  2010, Scottsdale, AZ, USA, October 24, 2010},
  pages        = {10},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1873548.1873558},
  doi          = {10.1145/1873548.1873558},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/SzilagyiK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cases/2010wess,
  title        = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS}
                  2010, Scottsdale, AZ, USA, October 24, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  isbn         = {978-1-4503-0078-0},
  timestamp    = {Mon, 14 Nov 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/2010wess.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics