The Community for Technology Leaders
Green Image
Issue No. 03 - July-September (vol. 7)
ISSN: 1545-5971

Editorial (HTML)

pp. 225

Differential Power Analysis Attacks to Precharged Buses: A General Analysis for Symmetric-Key Cryptographic Algorithms (Abstract)

Massimo Alioto , University of Siena, Siena
Massimo Poli , University of Siena, Siena
Santina Rocchi , University of Siena, Siena
pp. 226-239

On the Effects of Process Variation in Network-on-Chip Architectures (Abstract)

Chrysostomos Nicopoulos , University of Cyprus, Nicosia
Suresh Srinivasan , Intel Corp., Bangalore
Aditya Yanamandra , Pennsylvania State University, University Park
Dongkook Park , Intel Corp., Bangalore
Vijaykrishnan Narayanan , Pennsylvania State University, University Park
Chita R. Das , Pennsylvania State University, University Park
Mary J. Irwin , Pennsylvania State University, University Park
pp. 240-254

On the General Applicability of Instruction-Set Randomization (Abstract)

Stephen W. Boyd , SAS Institute Inc., Pittsburgh
Gaurav S. Kc , Google Inc., New York
Michael E. Locasto , George Mason University, Fairfax
Angelos D. Keromytis , Columbia University, New York
Vassilis Prevelakis , AEGIS Research Center in Information Security, Athens
pp. 255-270

On the Quality of Service of Crash-Recovery Failure Detectors (Abstract)

Tiejun Ma , Imperial College London, London
Jane Hillston , University of Edinburgh, Edinburgh
Stuart Anderson , University of Edinburgh, Edinburgh
pp. 271-283

On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures (Abstract)

Fei Xing , North Carolina State University, Raleigh
Wenye Wang , North Carolina State University, Raleigh
pp. 284-299

Role Engineering via Prioritized Subset Enumeration (Abstract)

Jaideep Vaidya , Rutgers University, Newark
Vijayalakshmi Atluri , Rutgers University, Newark
Janice Warner , Georgian Court University, Lakewood
Qi Guo , Rutgers University, Newark
pp. 300-314

Wavelet Codes for Algorithm-Based Fault Tolerance Applications (Abstract)

G. Robert Redinbo , University of California, Davis, Davis
pp. 315-328

Cluster-Based Key Predistribution Using Deployment Knowledge (Abstract)

Neeraj Mittal , The University of Texas at Dallas, Richardson
Ramon Novales , The University of Texas at Dallas , Richardson
pp. 329-335
92 ms
(Ver 3.3 (11022016))