Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Deposit type : Fulltext
labStructName_s : Laboratoire d'informatique de l'école normale supérieure
labStructName_s : Air Force Institute of Technology
Image document

Can code polymorphism limit information leakage?

Antoine Amarilli , Sascha Müller , David Naccache , Daniel Page , Pablo Rauzy , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers hal-01110259v1
Image document

Evaluating Digital Forensic Options for the Apple iPad

Andrew Hay , Dennis Krill , Benjamin Kuhar , Gilbert Peterson
7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.257-273, ⟨10.1007/978-3-642-24212-0_20⟩
Conference papers hal-01569561v1
Image document

An FPGA System for Detecting Malicious DNS Network Traffic

Brennon Thomas , Barry Mullins , Gilbert Peterson , Robert Mills
7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.195-207, ⟨10.1007/978-3-642-24212-0_15⟩
Conference papers hal-01569565v1