Sciweavers

31 search results - page 2 / 7
» ieeeares 2009
Sort
View
IEEEARES
2009
IEEE
14 years 1 months ago
Deconvolving Protected Signals
Abstract—The variable clock (VC) side-channel countermeasure consists in clocking a chip with an internal oscillator whose parameters (frequency, duty cycle, shape etc.) vary ran...
Mohaned Kafi, Sylvain Guilley, S. Marcello, David ...
IEEEARES
2009
IEEE
14 years 1 months ago
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones
Near Field Communication (NFC)-enabled mobile phones and services are starting to appear in the field, yet no attempt was made to analyze the security of NFC-enabled mobile phone...
Collin Mulliner
IEEEARES
2009
IEEE
14 years 1 months ago
Algebraic Properties in Alice and Bob Notation
—Alice and Bob notation is a popular way to describe security protocols: it is intuitive, succinct, and yet expressive. Several formal protocol specification languages are based...
Sebastian Mödersheim
IEEEARES
2009
IEEE
14 years 1 months ago
Web Service Trust: Towards a Dynamic Assessment Framework
— Trust in software services is a key prerequisite for the success and wide adoption of Services-Oriented Computing (SOC) in an open Internet world. However, trust is poorly asse...
George Spanoudakis, Stephane LoPresti
IEEEARES
2009
IEEE
14 years 1 months ago
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests
—The security assessment of the ICT components of critical infrastructures is nowadays a prominent problem. Risk assessment methodologies require, in order to be effective, to be...
Marcelo Masera, Igor Nai Fovino