Filter your results
- 1
- 1
- 1
- 1
- 2
- 2
- 1
- 2
- 1
- 3
- 1
- 1
- 4
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Data and Applications Security and Privacy XXVIISpringer, LNCS-7964, 2013, Lecture Notes in Computer Science, 978-3-642-39255-9. ⟨10.1007/978-3-642-39256-6⟩
Books
hal-01490722v1
|
||
|
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.75-90
Conference papers
hal-01506556v1
|