Search results for: Frank Vater
Lecture Notes in Computer Science > Wired/Wireless Internet Communications > Implementation Techniques > 79-91
Lecture Notes in Computer Science > Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems > Hardware and Cryptography II > 244-253
Lecture Notes in Computer Science > Information, Security and Cryptology – ICISC 2009 > Security Management and Efficient Implementation > 129-145
NORCHIP 2012 > 1 - 4
2012 IEEE International SOC Conference > 213 - 217