Filter your results
- 2
- 2
- 2
- 1
- 1
- 2
- 1
- 1
- 7
- 6
- 6
- 6
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
2 results
|
|
sorted by
|
|
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.93-109, ⟨10.1007/978-3-319-93524-9_6⟩
Conference papers
hal-01875521v1
|
||
|
ICT Based Interventions for Anganwadi Healthcare Workers in Mumbai16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.485-487, ⟨10.1007/978-3-319-68059-0_56⟩
Conference papers
hal-01679811v1
|