„hardware security“
Suchergebnisse
550 Treffer
-
Trustworthy Computing and Services – International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers
-
Information Security Theory and Practice. Securing the Internet of Things – 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 – July 2, 2014. Proceedings
-
Field-Coupled Nanocomputing – Paradigms, Progress, and Perspectives
-
Trustworthy Global Computing – 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers
-
Runtime Verification – 4th International Conference, RV 2013, Rennes, France, September 24-27, 2013. Proceedings
-
Information Security Technology for Applications – 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers
-
Information Security and Assurance – International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings
-
Digital Enterprise and Information Systems – International Conference, DEIS 2011, London, UK, July 20 – 22, 2011. Proceedings
-
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication – 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings
-
e-Business and Telecommunications – 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers
-
Security and Privacy in Mobile Information and Communication Systems – Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers
-
Runtime Verification – First International Conference, RV 2010, St. Julians, Malta, November 1-4, 2010. Proceedings
-
Advances in information security and its application – third international conference ; proceedings
-
Information security theory and practices – smart cards, mobile and ubiquitous computing systems ; first IFIP TC6, WG 8.8, WG 11.2 international workshop ; proceedings
-
Information security practice and experience – 4th international conference ; proceedings
-
Information security, practice and experience – third international conference ; proceedings
-
Information security practice and experience – second international conference ; proceedings
-
Hardware and Lifecycle Requirements for Secure PROFINET Devices
-
Lehrbuch der Softwaretechnik
-
Investigation of resistive switching in BiFeO3 and YMnO3 memristors and their applications in hardware security