Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

2 results
Deposit type : Fulltext
labStructName_s : Concordia Institute for Information Systems Engineering
labStructName_s : College of Information Engineering [Shenzhen]
Image document

A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images

Abdel Alim Kamal , Roger Zahno , Amr M. Youssef
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.75-90
Conference papers hal-01506556v1
Image document

Analyzing the Characteristics of Memory Subsystem on Two Different 8-Way NUMA Architectures

Qiuming Luo , Yuanyuan Zhou , Chang Kong , Guoqiang Liu , Ye Cai , et al.
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.155-166, ⟨10.1007/978-3-642-40820-5_14⟩
Conference papers hal-01513780v1