Universal mobile electrochemical detector designed for use in resource-limited applications
This paper describes an inexpensive, handheld device that couples the most common forms
of electrochemical analysis directly to “the cloud” using any mobile phone, for use in …
of electrochemical analysis directly to “the cloud” using any mobile phone, for use in …
ICSREF: A framework for automated reverse engineering of industrial control systems binaries
The security of Industrial Control Systems (ICS) has been attracting increased attention over
the past years, following the discovery of real threats targeting industrial environments …
the past years, following the discovery of real threats targeting industrial environments …
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
In 2006, the standard EPC Class-1 Generation-2 (EPC-C1G2) was ratified both by
EPCglobal and ISO. This standard can be considered as a “universal” specification for low …
EPCglobal and ISO. This standard can be considered as a “universal” specification for low …
[PDF][PDF] Volatile FPGA design security–a survey
S Drimer - IEEE Computer Society Annual Volume, 2008 - Citeseer
Volatile FPGAs, the dominant type of programmable logic devices, are used for space,
military, automotive, and consumer electronics applications which require them to operate in …
military, automotive, and consumer electronics applications which require them to operate in …
Security for volatile FPGAs
S Drimer - 2009 - cl.cam.ac.uk
With reconfigurable devices fast becoming complete systems in their own right, interest in
their security properties has increased. While research on “FPGA security” has been active …
their security properties has increased. While research on “FPGA security” has been active …
Bi-criteria appointment scheduling of patients with heterogeneous service sequences
This article addresses the challenges of scheduling patients with stochastic service times
and heterogeneous service sequences in multi-stage facilities, while considering the …
and heterogeneous service sequences in multi-stage facilities, while considering the …
Authentication of FPGA bitstreams: Why and how
S Drimer - International Workshop on Applied Reconfigurable …, 2007 - Springer
Encryption of volatile FPGA bitstreams provides confidentiality to the design but does not
ensure its authenticity. This paper motivates the need for adding authentication to the …
ensure its authenticity. This paper motivates the need for adding authentication to the …
Splice: Efficiently Removing a User's Data from In-memory Application State
Splice is a new programming framework that allows security-conscious applications to
efficiently locate and delete a user's in-memory state. The core technical challenge is …
efficiently locate and delete a user's in-memory state. The core technical challenge is …
Cryptanalysis of an EPC class-1 generation-2 standard compliant authentication protocol
Abstract Recently, Chen and Deng (2009) proposed an interesting new mutual
authentication protocol. Their scheme is based on a cyclic redundancy code (CRC) and a …
authentication protocol. Their scheme is based on a cyclic redundancy code (CRC) and a …
Data integrity algorithm based on additive generators and hash function
V Fomichev, D Bobrovskiy, A Koreneva… - Journal of Computer …, 2022 - Springer
Ensuring the integrity of data is one of the staple objectives in information security. For this
purpose, one can use different algorithms and approaches based on cryptographic hash …
purpose, one can use different algorithms and approaches based on cryptographic hash …