Works matching DE "COMPUTER input-output equipment -- Security measures"
Results: 9
Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device.
- Published in:
- Telecommunication Systems, 2010, v. 44, n. 3/4, p. 267, doi. 10.1007/s11235-009-9264-8
- By:
- Publication type:
- Article
Hardware Security in the Dark.
- Published in:
- International Journal of Software & Informatics, 2014, v. 8, n. 2, p. 193
- By:
- Publication type:
- Article
Data Center Cooling.
- Published in:
- ASHRAE Journal, 2008, v. 50, n. 8, p. 52
- By:
- Publication type:
- Article
Security Interrogation and Defense for SAR Analog to Digital Converter.
- Published in:
- Electronics (2079-9292), 2017, v. 6, n. 2, p. 48, doi. 10.3390/electronics6020048
- By:
- Publication type:
- Article
Two Stages Statistical Fault Analysis Method for Midori and Its Evaluation.
- Published in:
- Electronics & Communications in Japan, 2018, v. 101, n. 5, p. 3, doi. 10.1002/ecj.12057
- By:
- Publication type:
- Article
A Recent Study over Cyber Security and its Elements.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 791
- By:
- Publication type:
- Article
A Hybrid Approach for Detection and Correction of Transient Faults in SoCs.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 4, p. 439, doi. 10.1109/TDSC.2010.33
- By:
- Publication type:
- Article
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches.
- Published in:
- Journal of Cryptology, 2011, v. 24, n. 2, p. 292, doi. 10.1007/s00145-010-9085-7
- By:
- Publication type:
- Article
Remote System Repair Using Intel vPro Technology.
- Published in:
- Intel Technology Journal, 2008, v. 12, n. 4, p. 279
- By:
- Publication type:
- Article