Author of the publication

Hardware Security Evaluation Using Assurance Case Models.

, , , and . ARES, page 193-198. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacking Embedded ECC Implementations Through cmov Side Channels., , , and . SAC, volume 10532 of Lecture Notes in Computer Science, page 99-119. Springer, (2016)Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations (Extended Version)., and . IACR Cryptology ePrint Archive, (2017)Applying Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations., and . CARDIS, volume 10728 of Lecture Notes in Computer Science, page 213-231. Springer, (2017)Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers., , and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 289-309. Springer, (2015)Hardware Security Evaluation Using Assurance Case Models., , , and . ARES, page 193-198. IEEE Computer Society, (2015)Cache replication for information-centric networks through programmable networks., , and . Int. J. Grid Util. Comput., 10 (6): 607-617 (2019)Evaluation of Cache for Bandwidth Optimization in ICN Through Software-Defined Networks., , , , and . ISCC, page 656-661. IEEE, (2018)Towards an Architecture for Information-Centric Network with Content Replication in Edge Computing., , and . Advances in Edge Computing, volume 35 of Advances in Parallel Computing, IOS Press, (2020)Portability Evaluation of Cryptographic Libraries on Android Smartphones., and . CSS, volume 7672 of Lecture Notes in Computer Science, page 459-469. Springer, (2012)Presenting the Brazilian Project TSAM - Security Technologies for Mobile Environments., , and . MobiSec, volume 107 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 53-54. Springer, (2012)