Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Image
|
![]() |
A user privacy-centric access control policy of data for intelligent transportation systemsDistributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |
2 |
Material Type: Image
|
![]() |
SECCS: SECure Context Saving for IoT DevicesDistributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |
3 |
Material Type: Image
|
![]() |
Offline Personal Authenticating Device applied in Hospitals and E-banking - OffPADAttributionDigital Resources/Online E-Resources |
4 |
Material Type: Image
|
![]() |
Implementation of Rowhammer Effect in gem5Distributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |
5 |
Material Type: Image
|
![]() |
Towards Better Availability and Accountability for IoT Updates by means of a BlockchainCopyrightDigital Resources/Online E-Resources |
6 |
Material Type: Image
|
![]() |
SODA-IIoT4CriticalNetworks: Keep your Trusted Gateway for sensitive infrastructure up-to-date with BlockchainDistributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |
7 |
Material Type: Image
|
![]() |
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure correct configuration through secure updatesDistributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |
8 |
Material Type: Image
|
![]() |
SODA-IIoT4Energy: Blockchain-based Access Control to manage smart meter credentials & access rights for Smart GridsDistributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |
9 |
Material Type: Image
|
![]() |
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet accessDistributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |
10 |
Material Type: Image
|
![]() |
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection System up-to-dateDistributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |
11 |
Material Type: Image
|
![]() |
Privacy-preserving Wi-Fi tracking systemsDistributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |
12 |
Material Type: Image
|
![]() |
Power and Electromagnetic Analysis for Template AttacksDistributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |
13 |
Material Type: Image
|
![]() |
Une politique de contrôle d'accès à grains fins aux données pour les systèmes de transport intelligentsDistributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |
14 |
Material Type: Image
|
![]() |
Self Adaptation for Security Monitoring in IaaS cloudsDistributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |
15 |
Material Type: Image
|
![]() |
ARMHEx: a framework for efficient DIFT in real-world SoCsDistributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |
16 |
Material Type: Image
|
![]() |
Evariste III: A new multi-FPGA system for fair benchmarking of hardware dependent cryptographic primitivesDistributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |
17 |
Material Type: Image
|
![]() |
Apprentissage adverse et algorithmes de détection d'évènements : une première typologieDistributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |
18 |
Material Type: Image
|
![]() |
Appareil Personnel et Hors-ligne d'Authentification - OffPADAttributionDigital Resources/Online E-Resources |
19 |
Material Type: Image
|
![]() |
HardBlare: an efficient hardware-assisted DIFC for non-modified embedded processorsDistributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |
20 |
Material Type: Image
|
![]() |
Synthetic logs generator for fraud detection in mobile transfer servicesDistributed under a Creative Commons Attribution 4.0 International LicenseDigital Resources/Online E-Resources |