Sciweavers

2945 search results - page 7 / 589
» Designing and Implementing Malicious Hardware
Sort
View
EUROCAST
2001
Springer
73views Hardware» more  EUROCAST 2001»
15 years 4 months ago
Integrated Design and Implementation of Digital Controllers
Pedro Albertos, Alfons Crespo
WCNC
2008
IEEE
15 years 6 months ago
A Stochastic Model for Misbehaving Relays in Cooperative Diversity
—Existing cooperative diversity protocols are designed with the inherent assumption that users exhibit cooperative behavior all the time. However, in a practical cooperative wire...
Sintayehu Dehnie, Nasir D. Memon
ISJGP
2010
14 years 9 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
ACSAC
2009
IEEE
15 years 6 months ago
Analyzing and Detecting Malicious Flash Advertisements
—The amount of dynamic content on the web has been steadily increasing. Scripting languages such as JavaScript and browser extensions such as Adobe’s Flash have been instrument...
Sean Ford, Marco Cova, Christopher Kruegel, Giovan...