Filter your results
- 2
- 2
- 2
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
2 results
|
|
sorted by
|
|
Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.316-323, ⟨10.1007/978-3-642-12368-9_25⟩
Conference papers
hal-01056075v1
|
||
|
A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.82-97, ⟨10.1007/978-3-642-38530-8_6⟩
Conference papers
hal-01485935v1
|