History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 269 total

The exponential functions of central-symmetric $X$-form matrices. (English)
J. Math. Model. 4, No. 1, 19-34, electronic only (2016).
WorldCat.org
1
Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19‒22, 2016. Proceedings. (English)
Lecture Notes in Computer Science 9696. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). xiv, 668~p. (2016).
WorldCat.org
2
Towards a unified security model for physically unclonable functions. (English)
Sako, Kazue (ed.), Topics in cryptology ‒ CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 ‒ March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 271-287 (2016).
WorldCat.org
3
Regulating ARM TrustZone Devices in Restricted Spaces. (English)
MobiSys, 413-425(2016)
WorldCat.org
4
Security analysis on consumer and industrial IoT devices. (English)
ASP-DAC, 519-524(2016)
WorldCat.org
5
Invited - Things, trouble, trust: on building trust in IoT systems. (English)
DAC, 121:1-121:6(2016)
WorldCat.org
6
Energy-aware test-suite minimization for Android apps. (English)
ISSTA, 425-436(2016)
WorldCat.org
7
POSTER: Toward a Secure and Scalable Attestation. (English)
WISEC, 229-230(2016)
WorldCat.org
8
GarbledCPU: a MIPS processor for secure computation in hardware. (English)
DAC, 73:1-73:6(2016)
WorldCat.org
9
Analysis of key generation rate from wireless channel in in-band full-duplex communications. (English)
ICC Workshops, 104-109(2016)
WorldCat.org
10
CryptoML: Secure outsourcing of big data machine learning applications. (English)
HOST, 149-154(2016)
WorldCat.org
11
Strategy without tactics: policy-agnostic hardware-enhanced control-flow integrity. (English)
DAC, 163:1-163:6(2016)
WorldCat.org
12
Practical, Formal Synthesis and Automatic Enforcement of Security Policies for Android. (English)
DSN, 514-525(2016)
WorldCat.org
13
Subversive-C: Abusing and Protecting Dynamic Message Dispatch. (English)
USENIX Annual Technical Conference, 209-221(2016)
WorldCat.org
14
Remote attestation for low-end embedded devices: the prover’s perspective. (English)
DAC, 91:1-91:6(2016)
WorldCat.org
15
RCFD: A frequency-based channel access scheme for full-duplex wireless networks. (English)
ICC, 1-7(2016)
WorldCat.org
16
Remanence Decay Side-Channel: The PUF Case. (English)
IEEE Trans. Information Forensics and Security 11, N0. 6, 1106-1116(2016)
WorldCat.org
17
Games without Frontiers: Whither Information Security and Privacy? (English)
IEEE Security & Privacy 14, N0. 1, 3-5(2016)
WorldCat.org
18
The Cybersecurity Landscape in Industrial Control Systems. (English)
Proceedings of the IEEE 104, N0. 5, 1039-1057(2016)
WorldCat.org
19
Statistical QoS analysis of full duplex and half duplex heterogeneous cellular networks. (English)
ICC, 1-6(2016)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 269 total

Valid XHTML 1.0 Transitional Valid CSS!