Filter your results
- 7
- 7
- 7
- 7
- 1
- 2
- 3
- 2
- 3
- 1
- 3
- 4
- 1
- 3
- 1
- 7
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
End-to-End Adaptive Framework for Multimedia Information Retrieval9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.197-206, ⟨10.1007/978-3-642-21560-5_17⟩
Conference papers
hal-01583629v1
|
||
|
Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.010th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.18-33, ⟨10.1007/978-3-642-27257-8_2⟩
Conference papers
hal-00692172v1
|
||
|
FIRE: fault injection for reverse engineering5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.280-293, ⟨10.1007/978-3-642-21040-2_20⟩
Conference papers
hal-00690868v1
|
||
|
U-Note: Capture the Class and Access it EverywhereProceedings of the IFIP Conference on Human-Computer Interaction (Interact 2011), Sep 2011, Lisbonne, Portugal. pp.643-660, ⟨10.1007/978-3-642-23774-4_50⟩
Conference papers
hal-00671380v1
|
||
|
A Framework for Web Page Rank Prediction12th Engineering Applications of Neural Networks (EANN 2011) and 7th Artificial Intelligence Applications and Innovations (AIAI), Sep 2011, Corfu, Greece. pp.240-249, ⟨10.1007/978-3-642-23960-1_29⟩
Conference papers
hal-01571452v1
|
||
|
Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.297-313, ⟨10.1007/978-3-642-27257-8_19⟩
Conference papers
hal-00692171v1
|
||
|
Leakage Squeezing Countermeasure against High-Order Attacks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.208-223, ⟨10.1007/978-3-642-21040-2_14⟩
Conference papers
hal-01573295v1
|