Ara es mostren els items 1-12 de 43

    • On the Hardware Implementation Efficiency of CAESAR Authentication Ciphers for FPGA Devices 

      Sklavos, Nicolas; Kitsos, Paris; Voyiatzis, Artemios G. (2016-11-16)
      Text en actes de congrés
      Accés obert
    • Committees 

      Universitat Politècnica de Catalunya. Departament d'Enginyeria Electrònica (2016-11-14)
      Text en actes de congrés
      Accés obert
    • Welcome 

      Natale, Giorgio Di (2016-11-14)
      Text en actes de congrés
      Accés obert
    • Program 

      Universitat Politècnica de Catalunya. Departament d'Enginyeria Electrònica (2016-11-14)
      Text en actes de congrés
      Accés obert
    • Keynote Speech 

      Marshall, Richard (2016-11-14)
      Text en actes de congrés
      Accés obert
    • Invited Speaker 

      Pehl, Michael (2016-11-16)
      Text en actes de congrés
      Accés obert
    • H.264 Motion Vectors Based Cyber Defense/Attack Techniques 

      Hadar, Ofer; Segal, Rami; Birman, Raz (2016-11-15)
      Text en actes de congrés
      Accés obert
    • Experimental results on smartcards’ IC EM radiation 

      Mendo, N.; Nuevo, R.; Hernández, D. (2016-11-15)
      Text en actes de congrés
      Accés obert
    • On the Machine Learning Techniques for Side-channel Analysis 

      Picek, Stjepan; Heuser, Annelie; Guilley, Sylvain (2016-11-16)
      Text en actes de congrés
      Accés obert
      Side-channel attacks represent one of the most powerful category of attacks on cryptographic devices with profiled attacks in a prominent place as the most powerful among them. Indeed, for instance, template attack is ...
    • Trojans in Early Design Steps—An Emerging Threat 

      Polian, Ilia; Becker, Georg T.; Regazzoni, Francesco (2016-11-16)
      Text en actes de congrés
      Accés obert
      Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks ...
    • Secure Silicon: Towards Virtual Prototyping 

      Sauvage, Laurent; Takarabt, Sofiane; Souissi, Youssef (2016-11-14)
      Text en actes de congrés
      Accés obert
      Evaluating security vulnerabilities of software implementations at design step is of primary importance for applications developers, while it has received litte attention from scientific communauty. In this paper, we ...
    • Security Evaluation of Cyber-Physical Systems in Society- Critical Internet of Things 

      Izosimov, Viacheslav; Törngren, Martin (2016-11-15)
      Text en actes de congrés
      Accés obert
      In this paper, we present evaluation of security awareness of developers and users of cyber-physical systems. Our study includes interviews, workshops, surveys and one practical evaluation. We conducted 15 interviews ...