|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 42 publication records. Showing 42 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | David F. Oswald |
Wireless Attacks on Automotive Remote Keyless Entry Systems. |
TrustED@CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Marcel Medwed |
IoT Security Challenges and Ways Forward. |
TrustED@CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Naoya Torii, Dai Yamamoto, Tsutomu Matsumoto |
Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs. |
TrustED@CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ethan Gaebel, Ning Zhang 0017, Wenjing Lou, Y. Thomas Hou 0001 |
Looks Good To Me: Authentication for Augmented Reality. |
TrustED@CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Andrei Costin |
Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations. |
TrustED@CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Aurélien Francillon |
Analyzing Thousands of Firmware Images and a Few Physical Devices: What's Next? |
TrustED@CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Edgar R. Weippl, Stefan Katzenbeisser 0001, Mathias Payer, Stefan Mangard, Xinxin Fan, Tim Güneysu (eds.) |
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016 |
TrustED@CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Huth, René Guillaume, Paul Duplys, Kumaragurubaran Velmurugan, Tim Güneysu |
On the Energy Cost of Channel Based Key Agreement. |
TrustED@CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Hiller, Aysun Gurur Önalan, Georg Sigl, Martin Bossert |
Online Reliability Testing for PUF Key Derivation. |
TrustED@CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Markus Dürmuth, David F. Oswald, Niklas Pastewka |
Side-Channel Attacks on Fingerprint Matching Algorithms. |
TrustED@CCS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jan Nordholz, Julian Vetter, Michael Peter, Matthias Junker-Petschick, Janis Danisevskis |
XNPro: Low-Impact Hypervisor-Based Execution Prevention on ARM. |
TrustED@CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alexandra Mikityuk, Stefan Pham, Stefan Kaiser, Oliver Friedrich, Stefan Arbanowski |
Content Protection in HTML5 TV Platforms: Towards Browser-agnostic DRM and Cloud UI Environments. |
TrustED@CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Indrajit Ray, Xiaofeng Wang, Kui Ren 0001 (eds.) |
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015 |
TrustED@CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | André Schaller, Boris Skoric, Stefan Katzenbeisser 0001 |
On the Systematic Drift of Physically Unclonable Functions Due to Aging. |
TrustED@CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yang Xie, Chongxi Bao, Ankur Srivastava 0001 |
Security-Aware Design Flow for 2.5D IC Technology. |
TrustED@CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jakub Szefer |
Leveraging Processor Performance Counters for Security and Performance. |
TrustED@CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Marten van Dijk |
Hardware Security and its Adversaries. |
TrustED@CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | André Weimerskirch |
An Overview of Automotive Cybersecurity: Challenges and Solution Approaches. |
TrustED@CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryan A. Scheel, Akhilesh Tyagi |
Characterizing Composite User-Device Touchscreen Physical Unclonable Functions (PUFs) for Mobile Device Authentication. |
TrustED@CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xin Ye 0002, Mostafa Taha, Cong Chen, Thomas Eisenbarth 0001 |
Faster Leakage Detection and Exploitation. |
TrustED@CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Geremy Condra |
A Plea for Incremental Work in IoT Security. |
TrustED@CCS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad-Reza Sadeghi, Lucas Davi |
Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks. |
TrustED@CCS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Nyman, Jan-Erik Ekberg, N. Asokan |
Citizen Electronic Identities using TPM 2.0. |
TrustED@CCS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng |
Providing Root of Trust for ARM TrustZone using On-Chip SRAM. |
TrustED@CCS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Konrad-Felix Krentz, Gerhard Wunder |
6LoWPAN Security: Avoiding Hidden Wormholes using Channel Reciprocity. |
TrustED@CCS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chongxi Bao, Ankur Srivastava 0001 |
A Secure Algorithm for Task Scheduling against Side-channel Attacks. |
TrustED@CCS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Markku-Juhani Olavi Saarinen |
Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor. |
TrustED@CCS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yier Jin |
Embedded System Security in Smart Consumer Electronics. |
TrustED@CCS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gene Tsudik |
Challenges in Remote Attestation of Low-End Embedded Devices. |
TrustED@CCS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christof Paar |
How to Build Hardware Trojans. |
TrustED@CCS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tiffany Hyun-Jin Kim |
Challenges of Establishing Trust in Online Entities and Beyond. |
TrustED@CCS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gail-Joon Ahn, Frederik Armknecht, Jorge Guajardo (eds.) |
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014 |
TrustED@CCS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Sanjay K. Jha |
Securing data provenance in body area networks using lightweight wireless link fingerprints. |
TrustED@CCS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad-Reza Sadeghi, Frederik Armknecht, Jean-Pierre Seifert (eds.) |
TrustED'13, Proceedings of the 2013 ACM Workshop on Trustworthy Embedded Devices, Co-located with CCS 2013, November 4, 2013, Berlin, Germany |
TrustED@CCS |
2013 |
DBLP BibTeX RDF |
|
1 | Robbert van den Berg, Boris Skoric, Vincent van der Leest |
Bias-based modeling and entropy analysis of PUFs. |
TrustED@CCS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anthony Van Herrewege, Vincent van der Leest, André Schaller, Stefan Katzenbeisser 0001, Ingrid Verbauwhede |
Secure PRNG seeding on commercial off-the-shelf microcontrollers. |
TrustED@CCS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christian Boit, Clemens Helfmeier, Dmitry Nedospasov |
Feasibly clonable functions. |
TrustED@CCS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xinxin Fan, Nusa Zidaric, Mark D. Aagaard, Guang Gong |
Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic. |
TrustED@CCS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mads Dam, Roberto Guanciale, Hamed Nemati |
Machine code verification of a tiny ARM hypervisor. |
TrustED@CCS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Hiller, Michael Weiner, Leandro Rodrigues Lima, Maximilian Birkner, Georg Sigl |
Breaking through fixed PUF block limitations with differential sequence coding and convolutional codes. |
TrustED@CCS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dominik Merli, Rainer Plaga |
Physical unclonable functions: devices for cryptostorage. |
TrustED@CCS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nourhene Ellouze, Mohamed Allouche, Habib Ben Ahmed, Slim Rekhis, Noureddine Boudriga |
Securing implantable cardiac medical devices: use of radio frequency energy harvesting. |
TrustED@CCS |
2013 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #42 of 42 (100 per page; Change: )
|
|