|
Journals in DBLP
- Dimitrios N. Serpanos, Haris Lekatsas
Guest editorial: Special issue on embedded systems and security. [Citation Graph (0, 0)][DBLP] ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:459-460 [Journal]
- Srivaths Ravi, Anand Raghunathan, Paul C. Kocher, Sunil Hattangady
Security in embedded systems: Design challenges. [Citation Graph (0, 0)][DBLP] ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:461-491 [Journal]
- Jean-Sébastien Coron, David Naccache, Paul C. Kocher
Statistics and secret leakage. [Citation Graph (0, 0)][DBLP] ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:492-508 [Journal]
- Thomas J. Wollinger, Jan Pelzl, Volker Wittelsberger, Christof Paar, Gökay Saldamli, Çetin Kaya Koç
Elliptic and hyperelliptic curves on embedded µP. [Citation Graph (0, 0)][DBLP] ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:509-533 [Journal]
- Thomas J. Wollinger, Jorge Guajardo, Christof Paar
Security on FPGAs: State-of-the-art implementations and attacks. [Citation Graph (0, 0)][DBLP] ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:534-574 [Journal]
- Arash Reyhani-Masoleh, M. Anwar Hasan
Efficient digit-serial normal basis multipliers over binary extension fields. [Citation Graph (0, 0)][DBLP] ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:575-592 [Journal]
- Arash Reyhani-Masoleh, M. Anwar Hasan
Towards fault-tolerant cryptographic computations over finite fields. [Citation Graph (0, 0)][DBLP] ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:593-613 [Journal]
- Rong-Tai Liu, Nen-Fu Huang, Chih-Hao Chen, Chia-Nan Kao
A fast string-matching algorithm for network processor-based intrusion detection system. [Citation Graph (0, 0)][DBLP] ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:614-633 [Journal]
- Taejoon Park, Kang G. Shin
LiSP: A lightweight security protocol for wireless sensor networks. [Citation Graph (0, 0)][DBLP] ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:634-660 [Journal]
|