Sciweavers

7434 search results - page 178 / 1487
» Still
Sort
View
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
15 years 11 months ago
Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints
In this paper, we propose a preprocessing method to improve Side Channel Attacks (SCAs) on Dual-rail with Precharge Logic (DPL) countermeasure family. The strength of our method i...
Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger,...
118
Voted
DATE
2009
IEEE
194views Hardware» more  DATE 2009»
15 years 11 months ago
A UML frontend for IP-XACT-based IP management
—IP-XACT is a well accepted standard for the exchange of IP components at Electronic System and Register Transfer Level. Still, the creation and manipulation of these description...
Tim Schattkowsky, Tao Xie, Wolfgang Mueller
DEXAW
2009
IEEE
86views Database» more  DEXAW 2009»
15 years 11 months ago
Robust Service-Based Semantic Querying to Distributed Heterogeneous Databases
— The amount of semantic data on the Web has increased exponentially in the last years. One of the main reasons for this is the use of RDB2RDF systems, which generate RDF data fr...
Carlos Buil Aranda, Óscar Corcho, Amy Kraus...
129
Voted
DEXAW
2009
IEEE
111views Database» more  DEXAW 2009»
15 years 11 months ago
Integrating Security Patterns into the Electronic Invoicing Process
—The increasing automation of business processes is one of the main benefits of the ongoing technological evolution. Regarding e-invoices this automation process is still not op...
Michael Netter, Günther Pernul
HOST
2009
IEEE
15 years 11 months ago
Local Heating Attacks on Flash Memory Devices
This paper shows how lasers can be used to implement modification attacks on EEPROM and Flash memory devices. This was achieved with inexpensive laser-diode module mounted on a mic...
Sergei P. Skorobogatov