Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/host/host2015.bht:"
@inproceedings{DBLP:conf/host/AkkayaECM15, author = {Nail Etkin Can Akkaya and Burak Erbagci and Raymond Carley and Ken Mai}, title = {A DPA-resistant self-timed three-phase dual-rail pre-charge logic family}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {112--117}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140248}, doi = {10.1109/HST.2015.7140248}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/AkkayaECM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/BaoXS15, author = {Chongxi Bao and Yang Xie and Ankur Srivastava}, title = {A security-aware design scheme for better hardware Trojan detection sensitivity}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {52--55}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140236}, doi = {10.1109/HST.2015.7140236}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BaoXS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/BeckerWG15, author = {Georg T. Becker and Alexander Wild and Tim G{\"{u}}neysu}, title = {Security analysis of index-based syndrome coding for PUF-based key generation}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {20--25}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140230}, doi = {10.1109/HST.2015.7140230}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BeckerWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/BhargavaSM15, author = {Mudit Bhargava and Kaship Sheikh and Ken Mai}, title = {Robust true random number generator using hot-carrier injection balanced metastable sense amplifiers}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {7--13}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140228}, doi = {10.1109/HST.2015.7140228}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BhargavaSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/BidmeshkiM15, author = {Mohammad{-}Mahdi Bidmeshki and Yiorgos Makris}, title = {Toward automatic proof generation for information flow policies in third-party hardware {IP}}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {163--168}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140256}, doi = {10.1109/HST.2015.7140256}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BidmeshkiM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/BloomNSNL15, author = {Gedare Bloom and Bhagirath Narahari and Rahul Simha and Ali Namazi and Renato Levy}, title = {{FPGA} SoC architecture and runtime to prevent hardware Trojans from leaking secrets}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {48--51}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140235}, doi = {10.1109/HST.2015.7140235}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BloomNSNL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/ChakrabortyMM15, author = {Abhishek Chakraborty and Bodhisatwa Mazumdar and Debdeep Mukhopadhyay}, title = {A practical {DPA} on Grain v1 using {LS-SVM}}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {44--47}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140234}, doi = {10.1109/HST.2015.7140234}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/ChakrabortyMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/ChenFLCCY15, author = {Pai{-}Yu Chen and Runchen Fang and Rui Liu and Chaitali Chakrabarti and Yu Cao and Shimeng Yu}, title = {Exploiting resistive cross-point array for compact design of physical unclonable function}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {26--31}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140231}, doi = {10.1109/HST.2015.7140231}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/ChenFLCCY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/ExurvilleZRR15, author = {Ingrid Exurville and Lo{\"{\i}}c Zussa and Jean{-}Baptiste Rigaud and Bruno Robisson}, title = {Resilient hardware Trojans detection based on path delay measurements}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {151--156}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140254}, doi = {10.1109/HST.2015.7140254}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/ExurvilleZRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/GhoshC15, author = {Shamit Ghosh and Dipanwita Roy Chowdhury}, title = {Preventing fault attack on stream cipher using randomization}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {88--91}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140243}, doi = {10.1109/HST.2015.7140243}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/GhoshC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/GilmoreHO15, author = {Richard Gilmore and Neil Hanley and M{\'{a}}ire O'Neill}, title = {Neural network based attack on a masked implementation of {AES}}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {106--111}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140247}, doi = {10.1109/HST.2015.7140247}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/GilmoreHO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/GoddardLE15, author = {Zachary N. Goddard and Nicholas LaJeunesse and Thomas Eisenbarth}, title = {Power analysis of the t-private logic style for FPGAs}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {68--71}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140239}, doi = {10.1109/HST.2015.7140239}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/GoddardLE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/GuoKRJK15, author = {Xiaofei Guo and Naghmeh Karimi and Francesco Regazzoni and Chenglu Jin and Ramesh Karri}, title = {Simulation and analysis of negative-bias temperature instability aging on power analysis attacks}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {124--129}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140250}, doi = {10.1109/HST.2015.7140250}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/GuoKRJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/HorstmeyerARY15, author = {Roarke Horstmeyer and Sid Assawaworrarit and Ulrich R{\"{u}}hrmair and Changhuei Yang}, title = {Physically secure and fully reconfigurable data storage using optical scattering}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {157--162}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140255}, doi = {10.1109/HST.2015.7140255}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/HorstmeyerARY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/LinG15, author = {Cheng{-}Wei Lin and Swaroop Ghosh}, title = {A family of Schmitt-Trigger-based arbiter-PUFs and selective challenge-pruning for robustness and quality}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {32--37}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140232}, doi = {10.1109/HST.2015.7140232}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/LinG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/NgoBDGN15, author = {Xuan Thuy Ngo and Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, title = {Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {82--87}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140242}, doi = {10.1109/HST.2015.7140242}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/NgoBDGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/OteroTKHM15, author = {Carlos Tadeo Ortega Otero and Jonathan Tse and Robert Karmazin and Benjamin Hill and Rajit Manohar}, title = {Automatic obfuscated cell layout for trusted split-foundry design}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {56--61}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140237}, doi = {10.1109/HST.2015.7140237}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/OteroTKHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/PapadimitriouTH15, author = {Athanasios Papadimitriou and Marios Tampas and David H{\'{e}}ly and Vincent Beroulle and Paolo Maistri and R{\'{e}}gis Leveugle}, title = {Validation of {RTL} laser fault injection model with respect to layout information}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {78--81}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140241}, doi = {10.1109/HST.2015.7140241}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/PapadimitriouTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/RaoKRBP15, author = {Sushmita Kadiyala Rao and Deepak Krishnankutty and Ryan W. Robucci and Nilanjan Banerjee and Chintan Patel}, title = {Post-layout estimation of side-channel power supply signatures}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {92--95}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140244}, doi = {10.1109/HST.2015.7140244}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/RaoKRBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/RiviereNRDBS15, author = {Lionel Rivi{\`{e}}re and Zakaria Najm and Pablo Rauzy and Jean{-}Luc Danger and Julien Bringer and Laurent Sauvage}, title = {High precision fault injections on the instruction cache of ARMv7-M architectures}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {62--67}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140238}, doi = {10.1109/HST.2015.7140238}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/RiviereNRDBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/SahaC15, author = {Dhiman Saha and Dipanwita Roy Chowdhury}, title = {Diagonal fault analysis of Gr{\(\oslash\)}stl in dedicated {MAC} mode}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {100--105}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140246}, doi = {10.1109/HST.2015.7140246}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/SahaC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/SasdrichMMG15, author = {Pascal Sasdrich and Amir Moradi and Oliver Mischke and Tim G{\"{u}}neysu}, title = {Achieving side-channel protection with dynamic logic reconfiguration on modern FPGAs}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {130--136}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140251}, doi = {10.1109/HST.2015.7140251}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/SasdrichMMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/ShahverdiTE15, author = {Aria Shahverdi and Mostafa Taha and Thomas Eisenbarth}, title = {Silent Simon: {A} threshold implementation under 100 slices}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140227}, doi = {10.1109/HST.2015.7140227}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/ShahverdiTE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/SubramanyanRM15, author = {Pramod Subramanyan and Sayak Ray and Sharad Malik}, title = {Evaluating the security of logic encryption algorithms}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {137--143}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140252}, doi = {10.1109/HST.2015.7140252}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/SubramanyanRM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/WangWWQZ15, author = {Qian Wang and An Wang and Liji Wu and Gang Qu and Guoshuang Zhang}, title = {Template attack on masking {AES} based on fault sensitivity analysis}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {96--99}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140245}, doi = {10.1109/HST.2015.7140245}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/WangWWQZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/WilcoxSP15, author = {I. Wilcox and Fareena Saqib and James F. Plusquellic}, title = {{GDS-II} Trojan detection using multiple supply pad {VDD} and {GND} IDDQs in {ASIC} functional units}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {144--150}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140253}, doi = {10.1109/HST.2015.7140253}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/WilcoxSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/XiaoFT15, author = {Kan Xiao and Domenic Forte and Mark M. Tehranipoor}, title = {Efficient and secure split manufacturing via obfuscated built-in self-authentication}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {14--19}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140229}, doi = {10.1109/HST.2015.7140229}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/XiaoFT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/YuHD15, author = {Meng{-}Day (Mandel) Yu and Matthias Hiller and Srinivas Devadas}, title = {Maximum-likelihood decoding of device-specific multi-bit symbols for reliable key generation}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {38--43}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140233}, doi = {10.1109/HST.2015.7140233}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/YuHD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/YuceGS15, author = {Bilgiday Yuce and Nahid Farhady Ghalaty and Patrick Schaumont}, title = {{TVVF:} Estimating the vulnerability of hardware cryptosystems against timing violation attacks}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {72--77}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140240}, doi = {10.1109/HST.2015.7140240}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/YuceGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/ZhangDFL15, author = {Liwei Zhang and A. Adam Ding and Yunsi Fei and Pei Luo}, title = {Efficient 2nd-order power analysis on masked devices utilizing multiple leakage}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {118--123}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140249}, doi = {10.1109/HST.2015.7140249}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/ZhangDFL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/host/2015, title = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7119893/proceeding}, isbn = {978-1-4673-7420-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.