1
Software Engineering for Resilient Systems [E-Book] : 7th International Workshop, SERENE 2015, Paris, France, September 7-8, 2015. Proceedings /
Table of Contents: ... execution environment resilience: A white-box approach: Engineering Cross-Layer Fault Tolerance in Many-Core Systems -- Risk assessment based cloudification -- Stochastic Model-Based Analysis of Energy Consumption in a Rail Road Switch Heating System...

Full text 
2
Lightweight Cryptography for Security and Privacy [E-Book] : Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers /
Table of Contents: ...The SIMON and SPECK Block Ciphers on AVR 8-Bit Microcontrollers -- The Multiplicative Complexity of Boolean Functions on Four and Five Variables -- A Flexible and Compact Hardware Architecture for the SIMON Block Cipher -- AES Smaller Than S-Box...

Full text 
3
Modelling Foundations and Applications [E-Book] : 11th European Conference, ECMFA 2015, Held as Part of STAF 2015, L`Aquila, Italy, July 20-24, 2015. Proceedings /
Table of Contents: ... Modeling Tools- A Controlled Experiment -- Opening the Black-Box of Model Transformation -- Type Inference in Flexible Model-Driven Engineering....

Full text 
4
Testing Software and Systems [E-Book] : 26th IFIP WG 6.1 International Conference, ICTSS 2014, Madrid, Spain, September 23-25, 2014. Proceedings /
Table of Contents: ...: Automatic Test Set Generator for Embedded Reactive Systems -- Well-Defined Coverage Metrics for the Glass Box Test -- Industrial Experiences -- Cutting Time-to-Market by Adopting Automated Regression Testing in a Simulated Environment -- Testing Robotized Paint...

Full text 
5
Constructive Side-Channel Analysis and Secure Design [E-Book] : 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers /
Table of Contents: ... for Efficient MIA -- Generic DPA attacks: curse or blessing? -- Template Attacks on Different Devices -- Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis -- A Multiple-Fault Injection Attack by Adaptive Timing Control under Black-Box...

Full text 
6
Data and Applications Security and Privacy XXVIII [E-Book] : 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings /
Table of Contents: ... the Traveling Salesman Problem with Limited Disclosure -- ELITE: zEro Links Identity managemenT systEm -- Dynamic Workflow Adjustment with Security Constraints -- Consistent Query Plan Generation in Secure Cooperative Data Access -- Hunting the Unknown: White-Box...

Full text 
7
Constructive Side-Channel Analysis and Secure Design [E-Book] : 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers /
Table of Contents: ... Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers -- Updated Recommendations for Blinded Exponentiation vs. Single Trace Analysis -- On 3-Share Threshold Implementations for 4-Bit S-boxes -- Collision-Correlation...

Full text 
8
Middleware 2013 [E-Book] : ACM/IFIP/USENIX 14th International Middleware Conference, Beijing, China, December 9-13, 2013, Proceedings /
Table of Contents: ... -- Sprinkler — Reliable Broadcast for Geographically Dispersed Datacenters -- Transactional Failure Recovery for a Distributed Key-Value Store -- Views and Transactional Storage for Large Graphs -- Efficient Batched Synchronization in Drop box-Like Cloud Storage...

Full text 
9
Energy Efficiency in Large Scale Distributed Systems [E-Book] : COST IC0804 European Conference, EE-LSDS 2013, Vienna, Austria, April 22-24, 2013, Revised Selected Papers /
Table of Contents: ...Modeling and monitoring of power consumption -- Solving some Mysteries in Power Monitoring of Servers: Take Care of your Wattmeters! -- Energy Box: A Trace-driven Tool for Data Transmission Energy Consumption Studies -- Myths in PMC-based Power...

Full text 
10
Selected Areas in Cryptography [E-Book] : 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers /
Table of Contents: ...Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery -- Cryptanalysis of the Xiao – Lai White-Box...

Full text 
11
Cyberspace Safety and Security [E-Book] : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings /
Table of Contents: ... Attack to AES Using Reduced Searching Space -- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux -- Towards an Open Framework Leveraging a Trusted Execution Environment -- Secure Re-publication of Dynamic Big Data....

Full text 
12
Applications of Evolutionary Computation [E-Book] : 16th European Conference, EvoApplications 2013, Vienna, Austria, April 3-5, 2013. Proceedings /
Table of Contents: ... for Serpentine Channel Heat Sink -- Towards Non-linear ConstraintEstimation for Expensive Optimization Repair Methods for Box Constraints Revisited -- Scalability of Population-Based Search Heuristics for Many-Objective Optimization -- On GPU Based Fitness Evaluation...

Full text 
13
Security, Privacy, and Applied Cryptography Engineering [E-Book]: Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings /
Table of Contents: ... Ciphers -- Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs -- Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack -- Towards Formal Analysis of Key Control in Group Key Agreement Protocols -- Some...

Full text 
14
Cryptology and Network Security [E-Book] : 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings /
Table of Contents: ...Cryptanalysis -- Network security -- Cryptographic protocols -- Encryption -- S-box theory....

Full text