History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 91 total

You can’t touch this: Consumer-centric android application repackaging detection. (English)
Future Generation Comp. Syst. 65, 1-9(2016)
WorldCat.org
1
Two rounds RFID grouping-proof protocol. (English)
IEEE RFID, 161-174(2016)
WorldCat.org
2
Authentication based on a changeable biometric using gesture recognition with the Kinect™. (English)
ICB, 38-45(2015)
WorldCat.org
3
Let’s Get Mobile: Secure FOTA for Automotive System. (English)
NSS, 503-510(2015)
WorldCat.org
4
Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles. (English)
ARES, 139-148(2015)
WorldCat.org
5
Enhancing EMV Online PIN Verification. (English)
TrustCom/BigDataSE/ISPA (1), 808-817(2015)
WorldCat.org
6
Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures. (English)
TrustCom/BigDataSE/ISPA (1), 483-490(2015)
WorldCat.org
7
Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks. (English)
ESORICS (2), 541-560(2015)
WorldCat.org
8
Verifying software integrity in embedded systems: A side channel approach. (English)
Prouff, Emmanuel (ed.), Constructive side-channel analysis and secure design. 5th international workshop, COSADE 2014, Paris, France, April 13‒15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-10174-3/pbk; 978-3-319-10175-0/ebook). Lecture Notes in Computer Science 8622, 261-280 (2014).
WorldCat.org
9
CAN bus risk analysis revisit. (English)
Naccache, David (ed.) et al., Information security theory and practice. Securing the internet of things. 8th IFIP WG 11.2 international workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 ‒ July 2, 2014. Proceedings. Berlin: Springer (ISBN 978-3-662-43825-1/pbk). Lecture Notes in Computer Science 8501, 170-179 (2014).
WorldCat.org
10
Precise instruction-level side channel profiling of embedded processors. (English)
Huang, Xinyi (ed.) et al., Information security practice and experience. 10th international conference, ISPEC 2014, Fuzhou, China, May 5‒8, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06319-5/pbk). Lecture Notes in Computer Science 8434, 129-143 (2014).
WorldCat.org
11
Mobile Communication Security Controllers. (English)
Secure Smart Embedded Devices, Platforms and Applications, 227-266(2014)
WorldCat.org
12
Ownership Management in the Context of the Internet of Things. (English)
CyberC, 150-153(2014)
WorldCat.org
13
An Introduction to the Trusted Platform Module and Mobile Trusted Module. (English)
Secure Smart Embedded Devices, Platforms and Applications, 71-93(2014)
WorldCat.org
14
An Introduction to Smart Cards and RFIDs. (English)
Secure Smart Embedded Devices, Platforms and Applications, 3-25(2014)
WorldCat.org
15
The BIOS and Rootkits. (English)
Secure Smart Embedded Devices, Platforms and Applications, 369-381(2014)
WorldCat.org
16
Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains. (English)
AINA Workshops, 871-878(2014)
WorldCat.org
17
Practical Attacks on Virtual Worlds. (English)
CRiSIS, 180-195(2014)
WorldCat.org
18
Information Security Best Practices. (English)
Secure Smart Embedded Devices, Platforms and Applications, 119-144(2014)
WorldCat.org
19
An Introduction to Java Card Programming. (English)
Secure Smart Embedded Devices, Platforms and Applications, 497-513(2014)
WorldCat.org
20
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 91 total

Valid XHTML 1.0 Transitional Valid CSS!