In smart item environments, multitude of sensors are applied to capture data about product conditions and usage to guide business decisions as well as production automation proces...
Anja Klein, Hong Hai Do, Gregor Hackenbroich, Marc...
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...
Sequential consistency is the archetypal correctness condition for the memory protocols of shared-memory multiprocessors. Typically, such protocols are parameterized by the number ...
Jesse D. Bingham, Anne Condon, Alan J. Hu, Shaz Qa...
IPR (Intellectual Property Rights) Management is a complex domain. The IPR field is structured by evolving regulations, practises, business models,... Therefore, DRMS (Digital Righ...
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...