default search action
Transactions on Computational Science, Volume 10, 2010
- Marina L. Gavrilova, Chih Jeng Kenneth Tan, Edward D. Moreno:
Transactions on Computational Science X - Special Issue on Security in Computing, Part I. Lecture Notes in Computer Science 6340, Springer 2010, ISBN 978-3-642-17498-8 - Luca Compagna, Paul El Khoury, Fabio Massacci, Ayda Saïdane:
A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application. 1-24 - Ehsan Malekian, Ali Zakerolhosseini:
NTRU-Like Public Key Cryptosystems beyond Dedekind Domain up to Alternative Algebra. 25-41 - Dario Fiore, Rosario Gennaro:
Identity-Based Key Exchange Protocols without Pairings. 42-77 - Thomas Eisenbarth, Christof Paar, Björn Weghenkel:
Building a Side Channel Based Disassembler. 78-99 - Timo Kasper, David F. Oswald, Christof Paar:
A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices. 100-130 - Malay Kishore Dutta, Vinay K. Pathak, Phalguni Gupta:
An Adaptive Robust Watermarking Algorithm for Audio Signals Using SVD. 131-153 - Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray, Sudip Chakraborty:
Trust-Based Security Level Evaluation Using Bayesian Belief Networks. 154-186 - Johanna Sepúlveda, Ricardo Pires, Marius Strum, Jiang Chau Wang:
Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection. 187-201 - Jia Fan, Yuliang Zheng, Xiaohu Tang:
Signcryption with Non-interactive Non-repudiation without Random Oracles. 202-230 - Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez:
Block-Level Added Redundancy Explicit Authentication for Parallelized Encryption and Integrity Checking of Processor-Memory Transactions. 231-260 - Musard Balliu, Isabella Mastroeni:
A Weakest Precondition Approach to Robustness. 261-297 - Willi Geiselmann, Kenneth Matheis, Rainer Steinwandt:
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware. 298-328 - Siddhartha Chhabra, Yan Solihin:
Green Secure Processors: Towards Power-Efficient Secure Processor Design. 329-351 - Sung-Ming Yen, Kuo-Zhe Chiou, Je Zhang, Po-Han Lee:
A New Peer-to-Peer Micropayment Protocol Based on Transferable Debt Token. 352-363
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.