|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1065 occurrences of 522 keywords
|
|
|
Results
Found 2446 publication records. Showing 2446 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
92 | Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert |
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
Spike attacks, Software countermeasures, Transient fault model, RSA, Chinese Remainder Theorem, Fault attacks, Hardware security, Bellcore attack |
75 | Tal Malkin, François-Xavier Standaert, Moti Yung |
A Comparative Cost/Security Analysis of Fault Attack Countermeasures. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
Attacks and countermeasures in hardware and software |
66 | Thomas Popp, Stefan Mangard, Elisabeth Oswald |
Power Analysis Attacks and Countermeasures. |
IEEE Des. Test Comput. |
2007 |
DBLP DOI BibTeX RDF |
DPA-resistant logic styles, countermeasures, power analysis attacks |
57 | Takashi Hamaguchi, Kazuhiro Takeda, Yukiyasu Shimada, Yoshihiro Hashimoto |
Plant Model Generation for Countermeasures Planning. |
KES (3) |
2008 |
DBLP DOI BibTeX RDF |
Alarm Management, Countermeasures Planning, CE-matrices |
56 | Tai-Hoon Kim, Seung-youn Lee |
Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model. |
KES (2) |
2005 |
DBLP DOI BibTeX RDF |
|
56 | Stefan Mangard |
Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
|
53 | Philipp Grabher, Johann Großschädl, Dan Page |
Non-deterministic processors: FPGA-based analysis of area, performance and security. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
micro-architectural countermeasures, non-deterministic processors, side-channel attack, processor design |
47 | Yannick Monnet, Marc Renaudin, Régis Leveugle, Nathalie Feyt, Pascal Moitrel, F. M'Buwa Nzenguet |
Practical Evaluation of Fault Countermeasures on an Asynchronous DES Crypto Processor. |
IOLTS |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Paul Heymann, Georgia Koutrika, Hector Garcia-Molina |
Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges. |
IEEE Internet Comput. |
2007 |
DBLP DOI BibTeX RDF |
social Web sites, spam countermeasures, social media, spam, resource sharing, social search |
45 | Stefan Tillich, Christoph Herbst, Stefan Mangard |
Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
software countermeasures, implementation security, Advanced Encryption Standard, side-channel attacks, DPA, power analysis, instruction set extensions |
45 | Pierre-Alain Fouque, Frédéric Valette |
The Doubling Attack - Why Upwards Is Better than Downwards. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
SPA-based analysis, DPA countermeasures, multiple exponent single data attack, scalar multiplication, modular exponentiation |
40 | Tobias Hoppe, Stefan Kiltz, Jana Dittmann |
Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures. |
SAFECOMP |
2008 |
DBLP DOI BibTeX RDF |
Practical tests, Exemplary threats and countermeasures, Safety, Automotive, IT-Security |
40 | Stefan Tillich, Christoph Herbst |
Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
software countermeasures, operation randomization, advanced DPA attacks, smart card, Advanced Encryption Standard, side channel attacks, power analysis, masking |
38 | Denis Réal, Cécile Canovas, Jessy Clédière, M'hamed Drissi, Frédéric Valette |
Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis. |
DATE |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert |
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion |
38 | Tae Hyun Kim 0003, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim 0001 |
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Tai-Hoon Kim, Seung-youn Lee |
Design Procedure of IT Systems Security Countermeasures. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette |
Defeating Countermeasures Based on Randomized BSD Representations. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto |
Efficient Countermeasures against RPA, DPA, and SPA. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Elliptic curve exponentiation, ZPA, RPA, DPA, SPA |
38 | Ryôichi Sasaki, Hiroshi Yoshiura, Shinji Itoh |
Combinatorial Optimization of Countermeasures against Illegal Copying. |
Security Protocols Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
38 | M. Anwarul Hasan |
Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for Koblitz Curve Cryptosystems. |
IEEE Trans. Computers |
2001 |
DBLP DOI BibTeX RDF |
elliptic curve scalar multiplication, finite (or Galois) fields, Cryptography, power analysis attacks, Koblitz curves, number system |
38 | Michael Tunstall, Olivier Benoît |
Efficient Use of Random Delays in Embedded Software. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
Smart card security, fault attack countermeasures, side channel attack countermeasures |
36 | Shay Gueron |
Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
safe errors, RSA, smartcards, Fault attacks, countermeasures, embedded devices |
36 | Mathieu Ciet, Christophe Giraud 0001 |
Transient Fault Induction Attacks on XTR. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
public-key system XTR, smart cards, countermeasures, Differential fault analysis |
34 | Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund, Thomas Walter 0001 |
Breaking the memory secrecy assumption. |
EUROSEC |
2009 |
DBLP DOI BibTeX RDF |
buffer overread, probabilistic countermeasure, buffer overflow, systems security, bypass |
34 | Emmanuelle Dottax, Christophe Giraud 0001, Matthieu Rivain, Yannick Sierra |
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. |
WISTP |
2009 |
DBLP DOI BibTeX RDF |
Second Order, CRT-RSA, Fault Attacks, Countermeasure |
34 | Teodor Sommestad, Mathias Ekstedt, Pontus Johnson |
Combining Defense Graphs and Enterprise Architecture Models for Security Analysis. |
EDOC |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Emmanuel Prouff, Matthieu Rivain |
A Generic Method for Secure SBox Implementation. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Li-Chiou Chen, Kathleen M. Carley |
The impact of countermeasure propagation on the prevalence of computer viruses. |
IEEE Trans. Syst. Man Cybern. Part B |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Dong-Guk Han, Tetsuya Izu, Jongin Lim 0001, Kouichi Sakurai |
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao 0001 |
On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks. |
ICDCS |
2003 |
DBLP DOI BibTeX RDF |
packet interarrival times, traffic analysis attacks, statistical analysis, statistical pattern recognition |
32 | Wei Liao, Tie-Ping Yan, Yijin Wu, Helena Ndakeva, Xuying Yuan |
A Study on the Status, Problems and Its Countermeasures of Soil Erosion in Hubei Province, China. |
ESIAT (1) |
2009 |
DBLP DOI BibTeX RDF |
the countermeasures, Hubei of China, protection, problem, soil erosion |
32 | Thomas Dreibholz, Erwin P. Rathgeb, Xing Zhou |
On Robustness and Countermeasures of Reliable Server Pooling Systems Against Denial of Service Attacks. |
Networking |
2008 |
DBLP DOI BibTeX RDF |
Robustness, Denial of Service, Attacks, Countermeasures, Reliable Server Pooling |
32 | Johannes Blömer, Volker Krummel |
Analysis of Countermeasures Against Access Driven Cache Attacks on AES. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
AES, countermeasures, threat model, random permutations, cache attacks |
30 | Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos |
Treating scalability and modelling human countermeasures against local preference worms via gradient models. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Asmaa Adnane, Christophe Bidan, Rafael Timóteo de Sousa Júnior |
Trust-Based Countermeasures for Securing OLSR Protocol. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Marinho P. Barcellos, Daniel Bauermann, Henrique Sant'anna, Matheus B. Lehmann, Rodrigo B. Mansilha |
Protecting BitTorrent: Design and Evaluation of Effective Countermeasures against DoS Attacks. |
SRDS |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Chong Hee Kim, Jean-Jacques Quisquater |
Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song |
Distributed Evasive Scan Techniques and Countermeasures. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
scan detection, distributed scanning, information-hiding, evasion |
30 | Martin Boldt, Bengt Carlsson |
Analysing Countermeasures Against Privacy-Invasive Software. |
ICSEA |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Michael McIntosh, Paula Austel |
XML signature element wrapping attacks and countermeasures. |
SWS |
2005 |
DBLP DOI BibTeX RDF |
security policy, attack, vulnerability, web services security, countermeasure, XML signature |
30 | Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung |
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
30 | Ye Zhu 0001, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao 0001 |
On Flow Correlation Attacks and Countermeasures in Mix Networks. |
Privacy Enhancing Technologies |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao 0001, Dong Xuan |
Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks. |
ICPP |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Artemios G. Voyiatzis, Dimitrios N. Serpanos |
Active hardware attacks and proactive countermeasures. |
ISCC |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Kouichi Itoh, Jun Yajima, Masahiko Takenaka, Naoya Torii |
DPA Countermeasures by Improving the Window Method. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Marc Girault, Jean-François Misarsky |
Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
30 | M. Anwarul Hasan |
Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Yajuan Tang, Xiapu Luo, Rocky K. C. Chang |
Protecting Internet Services from Low-Rate DoS Attacks. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
low-rate DoS attacks, detection, Feedback control, countermeasures |
28 | Catherine H. Gebotys |
A split-mask countermeasure for low-energy secure embedded systems. |
ACM Trans. Embed. Comput. Syst. |
2006 |
DBLP DOI BibTeX RDF |
EM analysis, Side channel analysis, countermeasures, power attacks |
28 | Steven Cheung |
Denial of Service against the Domain Name System. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
denial of service, countermeasures, domain name system, threat analysis, network infrastructure |
28 | Raphael C.-W. Phan, Sung-Ming Yen |
Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
Attacks and countermeasures in hardware and software, cryptanalysis, Advanced Encryption Standard, side-channel attacks, fault attacks |
28 | Daniel Mesquita, Jean-Denis Techer, Lionel Torres, Gilles Sassatelli, Gaston Cambon, Michel Robert, Fernando Moraes 0001 |
Current mask generation: a transistor level security against DPA attacks. |
SBCCI |
2005 |
DBLP DOI BibTeX RDF |
cryptography, side channel attacks, DPA, countermeasures |
28 | Manuel Barbosa, Dan Page |
On the Automatic Construction of Indistinguishable Operations. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
Indistinguishable Operations, Countermeasures, Simple Power Analysis, Side-channel Cryptanalysis |
28 | Thomas Popp, Stefan Mangard |
Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
Hardware Countermeasures, MDPL, Masking Logic, Dual-Rail Pre-Charge Logic, DPA, Side-Channel Analysis |
28 | Marco Bucci, Michele Guglielmo, Raimondo Luzzi, Alessandro Trifiletti |
A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors. |
PATMOS |
2004 |
DBLP DOI BibTeX RDF |
chipcards, cryptography, Differential power analysis, DPA, power analysis, countermeasures |
28 | Jovan Dj. Golic |
DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Keyed reversible circuits, data scrambling, probing attacks, block ciphers, power analysis, countermeasures |
28 | Jovan Dj. Golic, Christophe Tymen |
Multiplicative Masking and Power Analysis of AES. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
multiplicative masking, AES, differential power analysis, countermeasures |
26 | Yue Wang 0001, Ran Tao 0003, Bing-Zhao Li 0001 |
Using the multi-living agent concept to investigate complex information systems. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
complex information system, multi-living-agent (MLA), self-organization mechanism, negotiation-coordination model, Swarm |
26 | Simon N. Foley, William M. Fitzgerald |
An Approach to Security Policy Configuration Using Semantic Threat Graphs. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Xu Guo 0001, Junfeng Fan, Patrick Schaumont, Ingrid Verbauwhede |
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Hua Wang, Yao Guo 0001, Xiangqun Chen |
DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security. |
HASE |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Michele Colajanni, Daniele Gozzi, Mirco Marchetti |
Collaborative architecture for malware detection and analysis. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Nele Mentens, Benedikt Gierlichs, Ingrid Verbauwhede |
Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Attila Ondi, Richard Ford |
How good is good enough? Metrics for worm/anti-worm evaluation. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti |
Using CP-nets as a guide for countermeasure selection. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Chong Hee Kim, Jean-Jacques Quisquater |
How can we overcome both side channel analysis and fault attacks on RSA-CRT? |
FDTC |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Christophe Giraud 0001 |
An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
Smart cards, RSA, fault injection, public-key cryptosystems, exponentiation, simple power analysis, side channel |
26 | Douglas P. Twitchell |
Social engineering in information assurance curricula. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
information security curriculum, social engineering |
26 | Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes |
Measuring Resistance to Social Engineering. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
Information security, Security metrics, Security testing, Vulnerability analysis, Social engineering |
26 | Eun-Jung Choi, Hyung-Jong Kim, Myuhng Joo Kim |
DMKB : A Defense Mechanism Knowledge Base. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Srivaths Ravi 0001, Anand Raghunathan, Srimat T. Chakradhar |
Tamper Resistance Mechanisms for Secure, Embedded Systems. |
VLSI Design |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Louis Goubin |
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards |
26 | Chris Karlof, David A. Wagner 0001 |
Hidden Markov Model Cryptanalysis. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Hardware Fault Attackon RSA with CRT Revisited. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
26 | Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stéphane Tinguely |
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
commercial and industrial security, COMP128, authentication, security protocols, side channel attacks, smartcards, GSM |
25 | K. N. R. K. Raju Alluri, Anil Kumar Vuppala |
IIIT-H Spoofing Countermeasures for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2019. |
INTERSPEECH |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Huajun Huang, Shaohong Zhong, Junshan Tan |
Browser-Side Countermeasures for Deceptive Phishing Attack. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Andreas Westfeld |
Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2. |
Information Hiding |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Richard R. Brooks, Jing-En Pang, Christopher Griffin 0001 |
Game and Information Theory Analysis of Electronic Countermeasures in Pursuit-Evasion Games. |
IEEE Trans. Syst. Man Cybern. Part A |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Peizhi Wang, Xinying Liu, Wenbo Li |
Analysis on Features and Countermeasures of Foreign-founded Enterprises' Sole Proprietorship in China. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
foreign direct investment, sole proprietorship, joint venture enterprise |
21 | Wojciech Mostowski, Erik Poll |
Malicious Code on Java Card Smartcards: Attacks and Countermeasures. |
CARDIS |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan P. Caulkins, Eric D. Hough, Nancy R. Mead, Hassan Osman |
Optimizing Investments in Security Countermeasures: A Practical Tool for Fixed Budgets. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Carlos Cardillo, Michael Russo, Patricia LeDuc, William Torch |
Quantitative EEG Changes Under Continuous Wakefulness and with Fatigue Countermeasures: Implications for Sustaining Aviator Performance. |
HCI (16) |
2007 |
DBLP DOI BibTeX RDF |
QEEG, CNS, Epoch, Artifact, Brain Mapping |
21 | Siyuan Liu, Chao Liu, Chunzhe Zhao, Yu Liu |
Mathematical Models and Optimization Discussion on EA System on AIDS/HIV Spread Estimating and Countermeasures Evaluating. |
BIBE |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Heiko Mantel, Henning Sudbrock |
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Kevin Eagles, Constantinos Markantonakis, Keith Mayes |
A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
Smart Card Security, Security, Sensor Networks, RFID, Security Models, Ubiquitous Networks |
21 | Wei Yu 0002, Nan Zhang 0004, Wei Zhao 0001 |
Self-adaptive Worms and Countermeasures. |
SSS |
2006 |
DBLP DOI BibTeX RDF |
Game theory, Worm |
21 | ManKi Ahn, Hoon-Jae Lee 0001 |
Experiments and Hardware Countermeasures on Power Analysis Attacks. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
SPA/DPA, Side Channel Attacks, Power Analysis, SmartCard, Countermeasure |
21 | Dag Arne Osvik, Adi Shamir, Eran Tromer |
Cache Attacks and Countermeasures: The Case of AES. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
cache, cryptanalysis, AES, side-channel attack, memory access |
21 | Daisuke Suzuki, Minoru Saeki |
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
|
21 | John Linn |
Technology and Web User Data Privacy: A Survey of Risks and Countermeasures. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
privacy, protocols, pseudonyms, rights management |
21 | Mamoon Yunus, Rizwan Mallal |
An Empirical Study of Security Threats and Countermeasures in Web Services-Based Services Oriented Architectures. |
WISE |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Feng Ouyang, Yunhe Li |
The actuality, questions and countermeasures of Electronic Commerce application in SMEs: a survey in the East of Guangdong Province, China. |
ICEC |
2005 |
DBLP DOI BibTeX RDF |
EC application, the SMEs, EC |
21 | Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, P. Sasikala, Seoung-Hyeon Lee, Jae-Kwang Lee |
Security Threats and Countermeasures in WLAN. |
AINTEC |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Youngsong Mun, Chungsoo Shin |
Secure Routing in Sensor Networks: Security Problem Analysis and Countermeasures. |
ICCSA (1) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Sang-ho Kim, Choon Seong Leem |
Security Threats and Their Countermeasures of Mobile Portable Computing Devices in Ubiquitous Computing Environments. |
ICCSA (4) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Mustapha Hedabou |
Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
?–adic method, precomputed table, Side Channel Attacks, Elliptic curve, scalar multiplication, Frobenius map |
21 | Roberto Maria Avanzi |
Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Smart cards, Side-channel attacks, Public-key cryptography, Differential power analysis (DPA), Timing attacks, Hyperelliptic curves |
21 | Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous |
Differential Power Analysis in the Presence of Hardware Countermeasures. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
hardware countermeasure, random process interrupt, smart card, Power analysis |
Displaying result #1 - #100 of 2446 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|