From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems., , и . SecureComm, том 127 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 288-304. Springer, (2013)Precise Instruction-Level Side Channel Profiling of Embedded Processors., , и . ISPEC, том 8434 из Lecture Notes in Computer Science, стр. 129-143. Springer, (2014)Platform verification and secure program execution in embedded devices.. Royal Holloway, University of London, Egham, UK, (2016)British Library, EThOS.Subscriber Centric Conditional Access System for Pay-TV Systems., , , и . ICEBE, стр. 450-455. IEEE Computer Society, (2013)WYK: Mobile Device Authentication Using the User's Address Book., , и . ETAA, том 13136 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2021)Verifying Software Integrity in Embedded Systems: A Side Channel Approach., , , и . COSADE, том 8622 из Lecture Notes in Computer Science, стр. 261-280. Springer, (2014)An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms., и . Secure Smart Embedded Devices, Platforms and Applications, Springer, (2014)Secure and Trusted Application Execution on Embedded Devices., , и . SECITC, том 9522 из Lecture Notes in Computer Science, стр. 3-24. Springer, (2015)