Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Contra medida electrónica")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 386

  • Page / 16
Export

Selection :

  • and

Differential fault analysis on AES key schedule and some countermeasuresCHEN, Chien-Ning; YEN, Sung-Ming.Lecture notes in computer science. 2003, pp 118-129, issn 0302-9743, isbn 3-540-40515-1, 12 p.Conference Paper

Parallelizable elliptic curve point multiplication method with resistance against side-channel attacksMÖLLER, Bodo.Lecture notes in computer science. 2002, pp 402-413, issn 0302-9743, isbn 3-540-44270-7, 12 p.Conference Paper

Understanding Scam Victims: Seven Principles for Systems SecuritySTAJANO, Franck; WILSON, Paul.Communications of the ACM. 2011, Vol 54, Num 3, pp 70-75, issn 0001-0782, 6 p.Article

Simulation os surveillance radar waveform fitted for anti-stealthness and for counter-countermeasuresGONGET, N; ARQUES, P. Y; MARTINET, L et al.CESA'96 IMACS Multiconference : computational engineering in systems applications. 1996, pp 666-669, isbn 2-9502908-5-X, 2VolConference Paper

Developing a Trojan applets in a smart cardIGUCHI-CARTIGNY, Julien; LANET, Jean-Louis.Journal in computer virology. 2010, Vol 6, Num 4, pp 343-351, issn 1772-9890, 9 p.Article

ECM techniques generatorNUNEZ, Abel S; MARSHALL, Patrick T; MCGRATH, Michael et al.Proceedings of SPIE, the International Society for Optical Engineering. 2006, pp 62280Z.1-62280Z.6, issn 0277-786X, isbn 0-8194-6284-5, 1VolConference Paper

A generic protection against high-order differential Power AnalysisAKKAR, Mehdi-Laurent; GOUBIN, Louis.Lecture notes in computer science. 2003, pp 192-205, issn 0302-9743, isbn 3-540-20449-0, 14 p.Conference Paper

EMC techniques in a high-density packaging system for telecommunication equipmentMORI, T; SHINOZAKI, K; YANAGIYA, M et al.NTT review. 1997, Vol 9, Num 6, pp 39-43, issn 0915-2334Article

Tsunami digital libraryIMAI, Sayaka; KANAMORI, Yoshinari; SHUTO, Nobuo et al.Lecture notes in computer science. 2006, pp 555-558, issn 0302-9743, isbn 3-540-44636-2, 1Vol, 4 p.Conference Paper

On the security of fair non-repudiation protocolsGÜRGENS, Sigrid; RUDOLPH, Carsten; VOGT, Holger et al.Lecture notes in computer science. 2003, pp 193-207, issn 0302-9743, isbn 3-540-20176-9, 15 p.Conference Paper

The effectiveness of radioelectronic systems in the case of optimum countermeasures using barrage jammingBYKOV, V. V.Telecommunications & radio engineering. 1992, Vol 47, Num 7, pp 74-77, issn 0040-2508Article

Higher order masking of the AESSCHRAMM, Kai; PAAR, Christof.Lecture notes in computer science. 2006, pp 208-225, issn 0302-9743, isbn 3-540-31033-9, 1Vol, 18 p.Conference Paper

Extending gibson's attacks on the GPT cryptosystemOVERBECK, Raphael.Lecture notes in computer science. 2006, pp 178-188, issn 0302-9743, isbn 3-540-35481-6, 1Vol, 11 p.Conference Paper

A computed approach to electronic countermeasures for deception of high resolution radarSAPER, R. H; DYCK, D. M.International conference on radar systemsRadar 99. International conference. 1999, 2Vol, vol 1, [5 p.]Conference Paper

Mine countermeasure support platform conversion ship designPROCTOR, B; NUTTING, M.Marine technology. 1994, Vol 31, Num 3, pp 201-214, issn 0025-3316Conference Paper

Fade counter-measures applied to transmissions at 20/30 GHzWILLIS, M. J.Electronics & communication engineering journal. 1991, Vol 3, Num 2, pp 88-96, issn 0954-0695, 9 p.Article

A relationship between products evaluation and IT systems assuranceKIM, Tai-Hoon; LEE, Seung-Youn.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-28894-5, vol1, 1125-1130Conference Paper

Measuring website popularity and raising designers' effortCHU, Ko-Kang; SHEN, Tsai-Chen; HSIA, Yen-Teh et al.International Conference on Systems, Man and Cybernetics. 2004, isbn 0-7803-8566-7, vol5, 4095-4099Conference Paper

Conflict-induced advantages of sides under countermeasure conditionsKARKOTSKIY, V. L; SHLYAKHIN, V. M; YAKOVLEV, YU. V et al.Telecommunications & radio engineering. 1992, Vol 47, Num 7, pp 57-59, issn 0040-2508Article

A survey of radar ECM and ECCMLI NENG-JING; ZHANG YI-TING.IEEE transactions on aerospace and electronic systems. 1995, Vol 31, Num 3, pp 1110-1120, issn 0018-9251Article

Access control requirements for preventing insider threatsPARK, Joon S; GIORDANO, Joseph.Lecture notes in computer science. 2006, pp 529-534, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 6 p.Conference Paper

Generic cryptanalysis of combined countermeasures with randomized BSD representationsTAE HYUN KIM; HAN, Dong-Guk; OKEYA, Katsuyuki et al.Lecture notes in computer science. 2006, pp 119-134, issn 0302-9743, isbn 3-540-33311-8, 1Vol, 16 p.Conference Paper

Timing attacks on NTUREncrypt via variation in the number of hash callsSILVERMAN, Joseph H; WHYTE, William.Lecture notes in computer science. 2006, pp 208-224, issn 0302-9743, isbn 978-3-540-69327-7, 1Vol, 17 p.Conference Paper

On the optimization of side-channel attacks by advanced stochastic methodsSCHINDLER, Werner.Lecture notes in computer science. 2005, pp 85-103, issn 0302-9743, isbn 3-540-24454-9, 19 p.Conference Paper

Selecting appropriate counter-measures in an intrusion detection frameworkCUPPENS, Frédéric; GOMBAULT, Sylvain; SANS, Thierry et al.Computer security foundations workshop. 2004, pp 78-87, isbn 0-7695-2169-X, 1Vol, 10 p.Conference Paper

  • Page / 16