Filter your results
- 4
- 4
- 4
- 1
- 1
- 2
- 4
- 4
- 4
- 1
- 1
- 1
- 1
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Quantitative Modal Transition Systems21th InternationalWorkshop on Algebraic Development Techniques (WADT), Jun 2012, Salamanca, Spain. pp.50-58, ⟨10.1007/978-3-642-37635-1_3⟩
Conference papers
hal-01485977v1
|
||
|
Runtime Code Polymorphism as a Protection Against Side Channel Attacks10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.136-152, ⟨10.1007/978-3-319-45931-8_9⟩
Conference papers
emse-01372223v1
|
||
|
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.93-109, ⟨10.1007/978-3-319-93524-9_6⟩
Conference papers
hal-01875521v1
|
||
|
A Timed Component Algebra for Services15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.242-257, ⟨10.1007/978-3-642-38592-6_17⟩
Conference papers
hal-01515250v1
|