Found: 14
Select item for more details and to access through your institution.
Cover1.
- Published in:
- 2010
- Publication type:
- Table of Contents
Cover2.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 3, p. c2, doi. 10.1109/TDSC.2010.63
- Publication type:
- Article
Cover3.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 3, p. c3, doi. 10.1109/TDSC.2010.30
- Publication type:
- Article
Cover4.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 3, p. c4, doi. 10.1109/TDSC.2010.31
- Publication type:
- Article
Editorial.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 3, p. 225, doi. 10.1109/TDSC.2010.32
- By:
- Publication type:
- Article
Differential Power Analysis Attacks to Precharged Buses: A General Analysis for Symmetric-Key Cryptographic Algorithms.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 3, p. 226, doi. 10.1109/TDSC.2009.1
- By:
- Publication type:
- Article
On the Effects of Process Variation in Network-on-Chip Architectures.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 3, p. 240, doi. 10.1109/TDSC.2008.59
- By:
- Publication type:
- Article
On the General Applicability of Instruction-Set Randomization.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 3, p. 255, doi. 10.1109/TDSC.2008.58
- By:
- Publication type:
- Article
On the Quality of Service of Crash-Recovery Failure Detectors.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 3, p. 271, doi. 10.1109/TDSC.2009.35
- By:
- Publication type:
- Article
On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 3, p. 284, doi. 10.1109/TDSC.2008.71
- By:
- Publication type:
- Article
Role Engineering via Prioritized Subset Enumeration.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 3, p. 300, doi. 10.1109/TDSC.2008.61
- By:
- Publication type:
- Article
Wavelet Codes for Algorithm-Based Fault Tolerance Applications.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 3, p. 315, doi. 10.1109/TDSC.2009.14
- By:
- Publication type:
- Article
Cluster-Based Key Predistribution Using Deployment Knowledge.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 3, p. 329, doi. 10.1109/TDSC.2009.34
- By:
- Publication type:
- Article
Call for Papers for Special Issue on Learning, Games and Security.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 3, p. 336, doi. 10.1109/TDSC.2010.27
- Publication type:
- Article