Sciweavers

IPPS
2009
IEEE
13 years 10 months ago
Combating side-channel attacks using key management
Embedded devices are widely used in military and civilian operations. They are often unattended, publicly accessible, and thus vulnerable to physical capture. Tamper-resistant mod...
Donggang Liu, Qi Dong
EUROSYS
2007
ACM
14 years 21 days ago
Concierge: a service platform for resource-constrained devices
As mobile and embedded devices become widespread, the management and configuration of the software in the devices is increasingly turning into a critical issue. OSGi is a busines...
Jan S. Rellermeyer, Gustavo Alonso
CHES
2009
Springer
121views Cryptology» more  CHES 2009»
14 years 4 months ago
MicroEliece: McEliece for Embedded Devices
Christof Paar, Stefan Heyse, Thomas Eisenbarth, Ti...