Memory attestation of wireless sensor nodes through trusted remote agents (English)
- New search for: Po-Hung, Y.
- New search for: Sung-Ming, Y.
- New search for: Po-Hung, Y.
- New search for: Sung-Ming, Y.
In:
IET INFORMATION SECURITY
;
11
, 6
;
338-344
;
2017
-
ISSN:
- Article (Journal) / Print
-
Title:Memory attestation of wireless sensor nodes through trusted remote agents
-
Contributors:Po-Hung, Y. ( author ) / Sung-Ming, Y. ( author )
-
Published in:IET INFORMATION SECURITY ; 11, 6 ; 338-344
-
Publisher:
- New search for: IEEE
-
Publication date:2017-01-01
-
Size:7 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 005.8
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 005.8 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 11, Issue 6
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 301
-
Low-latency digit-serial dual basis multiplier for lightweight cryptosystemsChiou, Che Wun / Lee, Chiou-Yng / Lin, Jim-Min / Yeh, Yun-Chi / Pan, Jeng-Shyang et al. | 2017
- 312
-
Fast and automatic security test on cryptographic ICs against fault injection attacks based on design for security testShao, Cuiping / Li, Huiyun / Zhou, Jianbin et al. | 2017
- 319
-
Defending shilling attacks in recommender systems using soft co-clusteringYang, Li / Huang, Wei / Niu, Xinxin et al. | 2017
- 326
-
Provably secure verifiable multi-stage secret sharing scheme based on monotone span programMashhadi, Samaneh / Hadian Dehkordi, Massoud / Kiamari, Niloofar et al. | 2017
- 332
-
Attribute-based encryption implies identity-based encryptionHerranz, Javier et al. | 2017
- 338
-
Memory attestation of wireless sensor nodes through trusted remote agentsYang, Po-Hung / Yen, Sung-Ming et al. | 2017
- 345
-
MNOS: a mimic network operating system for software defined networksHu, Hongchao / Wang, Zhenpeng / Cheng, Guozhen / Wu, Jiangxing et al. | 2017
- 356
-
Implementation flaws in the masking scheme of DPA Contest v4Veshchikov, Nikita / Guilley, Sylvain et al. | 2017
- 363
-
Internal state recovery of Grain v1 employing guess-and-determine attackMa, Zhen / Tian, Tian / Qi, Wen-Feng et al. | 2017
- 369
-
Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial Internet of ThingsYang, Wei / Wan, Yadong / Wang, Qin et al. | 2017
- 377
-
Impossible differential attacks on the SKINNY family of block ciphersYang, Dong / Qi, Wen-Feng / Chen, Hua-Jin et al. | 2017
- 386
-
Security assessment of the Spanish contactless identity cardRodríguez, Ricardo Julio / Garcia-Escartin, Juan Carlos et al. | 2017