![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
WESS 2009: Grenoble, France
- Dimitrios N. Serpanos, Wayne H. Wolf:
Proceedings of the 4th Workshop on Embedded Systems Security, WESS 2009, Grenoble, France, October 15, 2009. ACM 2009, ISBN 978-1-60558-700-4 - Philipp Grabher, Johann Großschädl, Dan Page:
Non-deterministic processors: FPGA-based analysis of area, performance and security. - Thomas Winkler, Bernhard Rinner:
Applications of trusted computing in pervasive smart camera networks. - Jean-Sébastien Coron, Ilya Kizhvatov:
Analysis of the split mask countermeasure for embedded systems. - Antonio Vincenzo Taddeo, Pierpaolo Marcon, Alberto Ferrante:
Negotiation of security services: a multi-criteria decision approach. - Jörg Brauer, Bastian Schlich, Thomas Reinbacher, Stefan Kowalewski:
Stack bounds analysis for microcontroller assembly code. - Juan Carlos Martínez Santos
, Yunsi Fei
, Zhijie Jerry Shi:
PIFT: efficient dynamic information flow tracking using secure page allocation. - Ahmadou Al Khary Séré, Julien Iguchi-Cartigny, Jean-Louis Lanet:
Automatic detection of fault attack and countermeasures. - Ilya Kizhvatov:
Side channel analysis of AVR XMEGA crypto engine. - Miroslav Knezevic, Ingrid Verbauwhede
:
Hardware evaluation of the Luffa hash family.
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.