The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Compilers, Architecture, and Synthesis for Embedded Systems (CASES) (cases)
2009 (conf/cases/2009wess)

  1. PIFT: efficient dynamic information flow tracking using secure page allocation. [Citation Graph (, )][DBLP]

  2. Hardware evaluation of the Luffa hash family. [Citation Graph (, )][DBLP]

  3. Side channel analysis of AVR XMEGA crypto engine. [Citation Graph (, )][DBLP]

  4. Non-deterministic processors: FPGA-based analysis of area, performance and security. [Citation Graph (, )][DBLP]

  5. Applications of trusted computing in pervasive smart camera networks. [Citation Graph (, )][DBLP]

  6. Analysis of the split mask countermeasure for embedded systems. [Citation Graph (, )][DBLP]

  7. Negotiation of security services: a multi-criteria decision approach. [Citation Graph (, )][DBLP]

  8. Automatic detection of fault attack and countermeasures. [Citation Graph (, )][DBLP]

  9. Stack bounds analysis for microcontroller assembly code. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002