Abstract is missing.
- Hardware evaluation of the Luffa hash familyMiroslav Knezevic, Ingrid Verbauwhede. [doi]
- Applications of trusted computing in pervasive smart camera networksThomas Winkler, Bernhard Rinner. [doi]
- PIFT: efficient dynamic information flow tracking using secure page allocationJuan Carlos Martinez Santos, Yunsi Fei, Zhijie Jerry Shi. [doi]
- Side channel analysis of AVR XMEGA crypto engineIlya Kizhvatov. [doi]
- Automatic detection of fault attack and countermeasuresAhmadou A. Sere, Julien Iguchi-Cartigny, Jean-Louis Lanet. [doi]
- Analysis of the split mask countermeasure for embedded systemsJean-Sébastien Coron, Ilya Kizhvatov. [doi]
- Stack bounds analysis for microcontroller assembly codeJörg Brauer, Bastian Schlich, Thomas Reinbacher, Stefan Kowalewski. [doi]
- Non-deterministic processors: FPGA-based analysis of area, performance and securityPhilipp Grabher, Johann Großschädl, Dan Page. [doi]
- Negotiation of security services: a multi-criteria decision approachAntonio Vincenzo Taddeo, Pierpaolo Marcon, Alberto Ferrante. [doi]