Sciweavers

3349 search results - page 46 / 670
» Data Security
Sort
View
IOLTS
2006
IEEE
68views Hardware» more  IOLTS 2006»
15 years 3 months ago
Power Attacks on Secure Hardware Based on Early Propagation of Data
The early propagation effect found in many logic gates is a potential source of data-dependent power consumption. We show that the effect and the corresponding power dependency ca...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
CC
2005
Springer
15 years 3 months ago
A Compiler-Based Approach to Data Security
Feihui Li, Guilin Chen, Mahmut T. Kandemir, Richar...
GECCO
2005
Springer
100views Optimization» more  GECCO 2005»
15 years 3 months ago
Improving network applications security: a new heuristic to generate stress testing data
Concettina Del Grosso, Giuliano Antoniol, Massimil...
FPL
2004
Springer
67views Hardware» more  FPL 2004»
15 years 3 months ago
A Key Management Architecture for Securing Off-Chip Data Transfers
Jonathan Graf, Peter M. Athanas