ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 5th Workshop on Embedded Systems Security - WESS '10
Latest Publications
TOTAL DOCUMENTS
12
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By ACM Press
9781450300780
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
A new correlation frequency analysis of the side channel
Proceedings of the 5th Workshop on Embedded Systems Security - WESS '10
◽
10.1145/1873548.1873552
◽
2010
◽
Cited By ~ 15
Author(s):
Edgar Mateos
◽
Catherine H. Gebotys
Keyword(s):
Frequency Analysis
◽
Side Channel
◽
New Correlation
Download Full-text
Countermeasures against fault attacks on software implemented AES
Proceedings of the 5th Workshop on Embedded Systems Security - WESS '10
◽
10.1145/1873548.1873555
◽
2010
◽
Cited By ~ 37
Author(s):
Alessandro Barenghi
◽
Luca Breveglieri
◽
Israel Koren
◽
Gerardo Pelosi
◽
Francesco Regazzoni
Keyword(s):
Fault Attacks
Download Full-text
Hardware-assisted security enhanced Linux in embedded systems
Proceedings of the 5th Workshop on Embedded Systems Security - WESS '10
◽
10.1145/1873548.1873551
◽
2010
◽
Cited By ~ 1
Author(s):
Leandro Fiorin
◽
Alberto Ferrante
◽
Konstantinos Padarnitsas
◽
Stefano Carucci
Keyword(s):
Embedded Systems
Download Full-text
Hardware trust implications of 3-D integration
Proceedings of the 5th Workshop on Embedded Systems Security - WESS '10
◽
10.1145/1873548.1873549
◽
2010
◽
Cited By ~ 3
Author(s):
Ted Huffmire
◽
Timothy Levin
◽
Michael Bilzor
◽
Cynthia E. Irvine
◽
Jonathan Valamehr
◽
...
Keyword(s):
Hardware Trust
Download Full-text
Secure protocols for serverless remote product authentication
Proceedings of the 5th Workshop on Embedded Systems Security - WESS '10
◽
10.1145/1873548.1873559
◽
2010
◽
Author(s):
Abdourhamane Idrissa
◽
Alain Aubert
◽
Thierry Fournel
◽
Viktor Fischer
Keyword(s):
Secure Protocols
Download Full-text
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software
Proceedings of the 5th Workshop on Embedded Systems Security - WESS '10
◽
10.1145/1873548.1873553
◽
2010
◽
Cited By ~ 1
Author(s):
Ambuj Sinha
◽
Zhimin Chen
◽
Patrick Schaumont
Keyword(s):
Embedded Software
◽
Comprehensive Analysis
◽
Side Channel
◽
Analysis Of Performance
Download Full-text
PoliMakE
Proceedings of the 5th Workshop on Embedded Systems Security - WESS '10
◽
10.1145/1873548.1873550
◽
2010
◽
Cited By ~ 5
Author(s):
Luis Angel D. Bathen
◽
Nikil Dutt
Download Full-text
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Proceedings of the 5th Workshop on Embedded Systems Security - WESS '10
◽
10.1145/1873548.1873558
◽
2010
◽
Cited By ~ 25
Author(s):
Chris Szilagyi
◽
Philip Koopman
Keyword(s):
Low Cost
◽
Embedded Control
◽
Control Networks
Download Full-text
Enhancing network-on-chip components to support security of processing elements
Proceedings of the 5th Workshop on Embedded Systems Security - WESS '10
◽
10.1145/1873548.1873560
◽
2010
◽
Cited By ~ 13
Author(s):
Slobodan Lukovic
◽
Nikolaos Christianos
Keyword(s):
Network On Chip
◽
Processing Elements
◽
On Chip
Download Full-text
Countering early evaluation
Proceedings of the 5th Workshop on Embedded Systems Security - WESS '10
◽
10.1145/1873548.1873554
◽
2010
◽
Cited By ~ 20
Author(s):
Shivam Bhasin
◽
Sylvain Guilley
◽
Florent Flament
◽
Nidhal Selmane
◽
Jean-Luc Danger
Keyword(s):
Early Evaluation
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close