Export 76 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is K [Clear All Filters]
"An enhanced workflow management for Utility Management System",
Proceedings of the International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2010), Moscow, Russia, October 18-20, 2010.
"Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-Threshold Devices through an Example of a 65nm AES Implementation",
7th Workshop on RFID Security and Privacy (RFIDSec), Amherst, Massachussets, USA, June, 2011.
"A Framework for Disturbance Analysis in Smart Grids by Fault Injection",
Springer Journal on "Computer Science - Research and Development", 09/2016.
"Functional model of Virtual Power Plant (VPP)",
Proceedings of the 2010 CIGRE (International Council on Large Electric Systems) Session, Paris, France, July, 2010.
"Functional model of Virtual Power Plant (VPP)",
Proceedings of the 2010 CIGRE (International Council on Large Electric Systems) Session, Paris, France, July, 2010.
"Functional requirements of embedded systems for monitoring and control structure of Virtual Power Plants",
Proceedings of the 2009 IEEE Workshop on Environmental, Energy, and Structural Monitoring Systems, Crema, Italy, September, 2009.
"Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software",
2nd International Conference on Trusted Systems (INTRUST), Beijing, China, December, 2010.
"Harvesting the potential of nano-CMOS for lightweight cryptography: An ultra-low-voltage 65 nm AES coprocessor for passive RFID tags",
Springer Journal of Cryptographic Engineering, vol. 1, issue 1, 2011.
"High-Level Synthesis of Benevolent Trojans",
Proceedings of the IEEE Design, Automation and Test in Europe Conference (DATE), 2019.
"Impact of Failure Prediction on Availability: Modeling and Comparative Analysis of Predictive and Reactive Methods",
IEEE Transactions on Dependable and Secure Computing, pp. 1-1, 2018.
"Intelligent, low-power and low-cost measurement system for energy consumption",
VECIMS 2003, Lugano, pp. 125-130, July 27-29, 2003.
"Interaction between Fault Attack Countermeasures and the Resistance against Power Analysis Attacks",
Fault Analysis in Cryptography: Springer Berlin Heidelberg, pp. 257-272, 2012.
"Lattice-based cryptography: From reconfigurable hardware to ASIC",
2016 International Symposium on Integrated Circuits (ISIC): IEEE, 12/2016.
"Learning in Nonstationary Environments: A Hybrid Approach",
Artificial Intelligence and Soft Computing, Cham, Springer International Publishing, 2017.
"Low Cost FPGA Implementations of the SHA-3 Finalists",
10th Smart Card Research and Advanced Application Conference (CARDIS), Leuven, Belgium, September, 2011.
"Low Cost Software Countermeasures Against Fault Attacks: Implementation and Performances Trade Offs",
5th Workshop on Embedded Systems Security (WESS), Scottsdale, Arizona, USA, October, 2010.
"A Methodology for Proactive Maintenance of Uninterruptible Power Supplies",
Latin-American Symposium on Dependable Computing (LADC2016) - Workshop on Dependability in Evolving Systems (WDES), Cali, Colombia, 10/2016.
"A Model for the Evaluation of User-Perceived Service Properties",
International Symposium on Parallel Distributed Processing, Workshops and Phd Forum (IPDPSW), Boston, Massachusetts, USA, IEEE Computer Society, May, 2013.
"Model-driven approach to design ICT infrastructure for precision farming",
17th IEEE Conference on Emerging Technologies and Factory Automation (ETFA), Kraków, Poland, IEEE Industrial Electronics Society, 09/2012.
"Modeling Requirements For Security-enhanced Design of Embedded Systems",
ICETE SECRYPT, Vienna, Austria, ICETE, 08/2014.