1
Catania, Barbara
2016
Table of Contents:
“..., and the Future -- Pay-as-you-go Data Integration: Experiences and Recurring Themes -- Foundations of Computer Science -- Robust Recoverable Path Using Backup Nodes -- On Contact Graphs with Cubes and Proportional Boxes -- Orthogonal Layout with Optimal Face Complexity...”2016
Full text
2
Table of Contents:
“...: a platform to detect stealth attacks -- Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality -- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing -- On the Security Cost of Using a Free and Open Source Component in a...”
Full text
Full text
3
Batina, Lejla.
2014
Table of Contents:
“... with Randomization: A Countermeasure for AES against Differential Fault Attacks -- Reversing Stealthy Dopant-Level Circuits -- Constructing S-boxes for Lightweight Cryptography with Feistel Structure -- Countermeasures -- A Statistical Model for Higher Order DPA on Masked...”2014
Full text