BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
against (7)
attack (6)
side (5)
channel (5)
analysi (5)

Stem countermeasur$ (all stems)

15 papers:

DACDAC-2015-YuUK
Leveraging on-chip voltage regulators as a countermeasure against side-channel attacks (WY, OAU, SK), p. 6.
DATEDATE-2014-DijkR #protocol
Protocol attacks on advanced PUF protocols and countermeasures (MvD, UR), pp. 1–6.
TACASTACAS-2014-EldibWS #smt #verification
SMT-Based Verification of Software Countermeasures against Side-Channel Attacks (HE, CW, PS), pp. 62–77.
CAVCAV-2014-EldibW #synthesis
Synthesis of Masking Countermeasures against Side Channel Attacks (HE, CW), pp. 114–130.
DACDAC-2013-AgostaBMP #analysis
Compiler-based side channel vulnerability analysis and optimized countermeasures application (GA, AB, MM, GP), p. 6.
DATEDATE-2013-TheissingMSSS #analysis #fault
Comprehensive analysis of software countermeasures against fault attacks (NT, DM, MS, FS, GS), pp. 404–409.
DACDAC-2012-AgostaBP #analysis
A code morphing methodology to automate power analysis countermeasures (GA, AB, GP), pp. 77–82.
DATEDATE-2012-NassarSGD #named #performance
RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs (MN, YS, SG, JLD), pp. 1173–1178.
DACDAC-2011-BayrakRBSI #analysis #automation #towards
A first step towards automatic application of power analysis countermeasures (AGB, FR, PB, FXS, PI), pp. 230–235.
DATEDATE-2010-IzumiISO #multi
Improved countermeasure against Address-bit DPA for ECC scalar multiplication (MI, JI, KS, KO), pp. 981–984.
DATEDATE-2008-RealCCDV #analysis #hardware
Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis (DR, CC, JC, MD, FV), pp. 1274–1279.
SACSAC-2007-BistarelliFP #using
Using CP-nets as a guide for countermeasure selection (SB, FF, PP), pp. 300–304.
DRRDRR-2005-LoprestiS #documentation #information management
Information leakage through document redaction: attacks and countermeasures (DPL, ALS), pp. 183–190.
ICEISICEIS-v3-2003-SawmaP #authentication #design #e-commerce #effectiveness
E-Commerce Authentication: An Effective Countermeasures Design Model (VDS, RLP), pp. 447–455.
HCIHCI-EI-1999-MahanMEHD #induction
Countermeasures Against Stress: Dynamic Cognitive Induction (RPM, CJM, LRE, EH, PTD), pp. 691–695.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.