Filter your results
- 8
- 8
- 8
- 8
- 8
- 3
- 5
- 9
- 7
- 6
- 6
- 6
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
8 results
|
|
sorted by
|
|
Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.297-313, ⟨10.1007/978-3-642-27257-8_19⟩
Conference papers
hal-00692171v1
|
||
|
Leakage Squeezing Countermeasure against High-Order Attacks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.208-223, ⟨10.1007/978-3-642-21040-2_14⟩
Conference papers
hal-01573295v1
|
||
|
Utility-Based Analytical Model for Representing User QoE9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.323-337, ⟨10.1007/978-3-642-21560-5_27⟩
Conference papers
hal-01583631v1
|
||
|
Scaling Microblogging Services with Divergent Traffic Demands12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.20-40, ⟨10.1007/978-3-642-25821-3_2⟩
Conference papers
hal-01597765v1
|
||
|
oBGP: An Overlay for a Scalable iBGP Control Plane10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.420-431, ⟨10.1007/978-3-642-20757-0_33⟩
Conference papers
hal-01583402v1
|
||
|
Formal Framework for the Evaluation of Waveform Resynchronization Algorithms5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.100-115, ⟨10.1007/978-3-642-21040-2_7⟩
Conference papers
hal-01573296v1
|
||
|
Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.010th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.18-33, ⟨10.1007/978-3-642-27257-8_2⟩
Conference papers
hal-00692172v1
|
||
|
U-Note: Capture the Class and Access it EverywhereProceedings of the IFIP Conference on Human-Computer Interaction (Interact 2011), Sep 2011, Lisbonne, Portugal. pp.643-660, ⟨10.1007/978-3-642-23774-4_50⟩
Conference papers
hal-00671380v1
|