History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 249 total

Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19‒22, 2016. Proceedings. (English)
Lecture Notes in Computer Science 9696. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). xiv, 668~p. (2016).
WorldCat.org
1
Towards a unified security model for physically unclonable functions. (English)
Sako, Kazue (ed.), Topics in cryptology ‒ CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 ‒ March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 271-287 (2016).
WorldCat.org
2
Security analysis on consumer and industrial IoT devices. (English)
ASP-DAC, 519-524(2016)
WorldCat.org
3
The Cybersecurity Landscape in Industrial Control Systems. (English)
Proceedings of the IEEE 104, N0. 5, 1039-1057(2016)
WorldCat.org
4
Games without Frontiers: Whither Information Security and Privacy? (English)
IEEE Security & Privacy 14, N0. 1, 3-5(2016)
WorldCat.org
5
Remanence Decay Side-Channel: The PUF Case. (English)
IEEE Trans. Information Forensics and Security 11, N0. 6, 1106-1116(2016)
WorldCat.org
6
Reducing combinatorics in GUI testing of android applications. (English)
ICSE, 559-570(2016)
WorldCat.org
7
Market-driven code provisioning to mobile secure hardware. (English)
Böhme, Rainer (ed.) et al., Financial cryptography and data security. 19th international conference, FC 2015, San Juan, Puerto Rico, January 26‒30, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-47853-0/pbk; 978-3-662-47854-7/ebook). Lecture Notes in Computer Science 8975, 387-404 (2015).
WorldCat.org
8
Smart and secure cross-device apps for the Internet of advanced things. (English)
Böhme, Rainer (ed.) et al., Financial cryptography and data security. 19th international conference, FC 2015, San Juan, Puerto Rico, January 26‒30, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-47853-0/pbk; 978-3-662-47854-7/ebook). Lecture Notes in Computer Science 8975, 272-290 (2015).
WorldCat.org
9
XiOS: Extended Application Sandboxing on iOS. (English)
ASIACCS, 43-54(2015)
WorldCat.org
10
Lighting the Dark-Silicon 3D Chip Multi-processors by Exploiting Heterogeneity in Cache Hierarchy. (English)
MCSoC, 182-186(2015)
WorldCat.org
11
How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL. (English)
WISEC, 18:1-18:12(2015)
WorldCat.org
12
Automated Synthesis of Optimized Circuits for Secure Computation. (English)
ACM Conference on Computer and Communications Security, 1504-1517(2015)
WorldCat.org
13
TyTAN: tiny trust anchor for tiny devices. (English)
DAC, 34:1-34:6(2015)
WorldCat.org
14
Security and privacy challenges in industrial internet of things. (English)
DAC, 54:1-54:6(2015)
WorldCat.org
15
Compacting privacy-preserving k-nearest neighbor search using logic synthesis. (English)
DAC, 36:1-36:6(2015)
WorldCat.org
16
SEDA: Scalable Embedded Device Attestation. (English)
ACM Conference on Computer and Communications Security, 964-975(2015)
WorldCat.org
17
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications. (English)
IEEE Symposium on Security and Privacy, 745-762(2015)
WorldCat.org
18
I Know Where You are: Proofs of Presence Resilient to Malicious Provers. (English)
ASIACCS, 567-577(2015)
WorldCat.org
19
Analysis of Android Inter-App Security Vulnerabilities Using COVERT. (English)
ICSE (2), 725-728(2015)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 249 total

Valid XHTML 1.0 Transitional Valid CSS!