Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions (Englisch)
- Neue Suche nach: Durvaux, Francois
- Neue Suche nach: Gerard, Benoit
- Neue Suche nach: Kerckhof, Stephanie
- Neue Suche nach: Koeune, Francois
- Neue Suche nach: Standaert, Francois-Xavier
- Neue Suche nach: Durvaux, Francois
- Neue Suche nach: Gerard, Benoit
- Neue Suche nach: Kerckhof, Stephanie
- Neue Suche nach: Koeune, Francois
- Neue Suche nach: Standaert, Francois-Xavier
In:
WISA, International Workshop on Information Security Applications, 13
;
208-225
;
2012
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions
-
Beteiligte:Durvaux, Francois ( Autor:in ) / Gerard, Benoit ( Autor:in ) / Kerckhof, Stephanie ( Autor:in ) / Koeune, Francois ( Autor:in ) / Standaert, Francois-Xavier ( Autor:in )
-
Erschienen in:Lecture Notes in Computer Science ; 7690 ; 208-225
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:2012
-
Format / Umfang:18 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Security on LBlock against Biclique CryptanalysisWang, Y. / Wu, W. / Yu, X. / Zhang, L. et al. | 2012
- 15
-
Improved Impossible Differential Attacks on Reduced-Round MISTY1Jia, K. / Li, L. et al. | 2012
- 28
-
Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUsTanaka, S. / Chou, T. / Yang, B.-Y. / Cheng, C.-M. / Sakurai, K. et al. | 2012
- 43
-
Enumeration of Even-Variable Boolean Functions with Maximum Algebraic ImmunityZhao, W. / Hai, X. / Fu, S. / Li, C. / Wang, Y. et al. | 2012
- 55
-
Multi-precision Multiplication for Public-Key Cryptography on Embedded MicroprocessorsSeo, H. / Kim, H. et al. | 2012
- 68
-
Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power ConsumptionKim, H. / Rozic, V. / Verbauwhede, I. et al. | 2012
- 82
-
Improved Differential Fault Analysis on Block Cipher ARIAPark, J. / Ha, J. et al. | 2012
- 96
-
Multi-Level Controlled SignatureThorncharoensri, P. / Susilo, W. / Mu, Y. et al. | 2012
- 111
-
Tate Pairing Computation on Generalized Hessian CurvesLi, L. / Zhang, F. et al. | 2012
- 124
-
Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle ModelLarangeira, M. / Tanaka, K. et al. | 2012
- 144
-
An Authentication and Key Management Scheme for the Proxy Mobile IPv6Kang, H.-S. / Park, C.-S. et al. | 2012
- 161
-
Payment Approval for PayWordAszalos, L. / Huszti, A. et al. | 2012
- 177
-
Anonymity-Based Authenticated Key Agreement with Full Binding PropertyHwang, J.Y. / Eom, S. / Chang, K.-Y. / Lee, P.J. / Nyang, D. et al. | 2012
- 192
-
A Study for Classification of Web Browser Log and Timeline VisualizationOh, J. / Son, N. / Lee, S. / Lee, K. et al. | 2012
- 208
-
Intellectual Property Protection for Integrated Systems Using Soft Physical Hash FunctionsDurvaux, F. / Gerard, B. / Kerckhof, S. / Koeune, F. / Standaert, F.-X. et al. | 2012
- 226
-
N-Victims: An Approach to Determine N-Victims for APT InvestigationsLiu, S.-T. / Chen, Y.-M. / Hung, H.-C. et al. | 2012
- 241
-
An Efficient Filtering Method for Detecting Malicous Web PagesChoi, J. / Kim, G. / Kim, T.G. / Kim, S. et al. | 2012
- 254
-
Lightweight Client-Side Methods for Detecting Email ForgeryLin, E. / Aycock, J. / Mannan, M. et al. | 2012
- 270
-
AIGG Threshold Based HTTP GET Flooding Attack DetectionChoi, Y.-s. / Kim, I.-K. / Oh, J.-T. / Jang, J.-S. et al. | 2012
- 285
-
Implementation of GESNIC for Web Server Protection against HTTP GET Flooding AttacksKim, H. / Kim, B. / Kim, D. / Kim, I.-K. / Chung, T.-M. et al. | 2012
- 296
-
Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into PracticeHussain, R. / Kim, S. / Oh, H. et al. | 2012
- 312
-
On Trigger Detection against Reactive Jamming Attacks: A Localized SolutionShin, I. / Kim, S. / Seo, J. et al. | 2012
- 328
-
Efficient Self-organized Trust Management in Location Privacy Enhanced VANETsWei, Y.-C. / Chen, Y.-M. et al. | 2012
- 345
-
A Trust Management Model for QoS-Based Service SelectionKim, Y. / Doh, K.-G. et al. | 2012
- 358
-
Multilevel Secure Database on Security Enhanced Linux for System High Distributed SystemsKimm, H. / Sherpa, N. et al. | 2012