History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 72 total

Precise instruction-level side channel profiling of embedded processors. (English)
Huang, Xinyi (ed.) et al., Information security practice and experience. 10th international conference, ISPEC 2014, Fuzhou, China, May 5‒8, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06319-5/pbk). Lecture Notes in Computer Science 8434, 129-143 (2014).
WorldCat.org
1
Verifying Software Integrity in Embedded Systems: A Side Channel Approach. (English)
COSADE, 261-280(2014)
WorldCat.org
2
Remote E-Voting Using the Smart Card Web Server. (English)
IJSSEIJSSE 5, N0. 1, 39-60(2014)
WorldCat.org
3
Ownership Management in the Context of the Internet of Things. (English)
CyberC, 150-153(2014)
WorldCat.org
4
Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains. (English)
AINA Workshops, 871-878(2014)
WorldCat.org
5
Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR. (English)
TrustCom, 422-431(2014)
WorldCat.org
6
Trusted Platform Module for Smart Cards. (English)
NTMS, 1-5(2014)
WorldCat.org
7
CAN Bus Risk Analysis Revisit. (English)
WISTP, 170-179(2014)
WorldCat.org
8
Remote attestation mechanism for user centric smart cards using pseudorandom number generators. (English)
Qing, Sihan (ed.) et al., Information and communications security. 15th international conference, ICICS 2013, Beijing, China, November 20‒22, 2013. Proceedings. Berlin: Springer (ISBN 978-3-319-02725-8/pbk). Lecture Notes in Computer Science 8233, 151-166 (2013).
WorldCat.org
9
Using the smart card web server in secure branchless banking. (English)
Lopez, Javier (ed.) et al., Network and system security. 7th international conference, NSS 2013, Madrid, Spain, June 3‒4, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38630-5/pbk). Lecture Notes in Computer Science 7873, 250-263 (2013).
WorldCat.org
10
Computer security ‒ ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9‒13, 2013. Proceedings. (English)
Lecture Notes in Computer Science 8134. Berlin: Springer (ISBN 978-3-642-40202-9/pbk). xviii, 794~p. EUR~101.65 (2013).
WorldCat.org
11
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model. (English)
TrustCom/ISPA/IUCC, 336-345(2013)
WorldCat.org
12
Virtual World Authentication Using the Smart Card Web Server. (English)
SSCC, 30-41(2013)
WorldCat.org
13
Recovering from a Lost Digital Wallet. (English)
HPCC/EUC, 1615-1621(2013)
WorldCat.org
14
The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems. (English)
SecureComm, 288-304(2013)
WorldCat.org
15
Card-Present Transactions on the Internet Using the Smart Card Web Server. (English)
TrustCom/ISPA/IUCC, 611-619(2013)
WorldCat.org
16
A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA. (English)
ICITST, 44-51(2013)
WorldCat.org
17
Vulnerability Analysis of a Commercial .NET Smart Card. (English)
CARDIS, 125-139(2013)
WorldCat.org
18
Subscriber Centric Conditional Access System for Pay-TV Systems. (English)
ICEBE, 450-455(2013)
WorldCat.org
19
Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture. (English)
Chim, Tat Wing (ed.) et al., Information and communications security. 14th international conference, ICICS 2012, Hong Kong, China, October 29‒31, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34128-1/pbk). Lecture Notes in Computer Science 7618, 214-227 (2012).
WorldCat.org
20
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 72 total

Valid XHTML 1.0 Transitional Valid CSS!