Several constituencies are working on building and preserving users trust in the digital economy ...
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generatin...
This book provides an in-depth look at return-oriented programming attacks. It explores severa...
This book constitutes the refereed proceedings of the 14th International Conference on Applied Cr...
This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Pri...
InhaltsangabePhysically Unclonable Functions (PUFs).- Physically Unclonable Functions: A Study on...
InhaltsangabeCryptanalysis.- Network security.- Cryptographic protocols.- Encryption.- S-box theory.
InhaltsangabeKeynote.- Can Nature Help Us Solve Risk Management Issues? Position Paper.- Electron...
The concept of trust is related to many aspects of our daily lives, and different stakeholders us...
This book constitutes the refereed proceedings of the Second Western European Workshop on Researc...
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International...
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generatin...