This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Pri...
InhaltsangabeKeynote.- Can Nature Help Us Solve Risk Management Issues? Position Paper.- Electron...
This book provides an in-depth look at return-oriented programming attacks. It explores several c...
InhaltsangabePhysically Unclonable Functions (PUFs).- Physically Unclonable Functions: A Study on...
InhaltsangabeCryptanalysis.- Network security.- Cryptographic protocols.- Encryption.- S-box theory.
This book constitutes the refereed proceedings of the Second Western European Workshop on Researc...
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International...
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generatin...
This book constitutes the refereed proceedings of the 14th International Conference on Applied Cr...
This volume contains the proceedings of the Third International Conference on Trust and Trustwort...
Today, embedded systems are used in many security-critical applications, from access control, ele...