Sciweavers

77 search results - page 16 / 16
» Keeping Bits Safe: How Hard Can It Be
Sort
View
SENSYS
2003
ACM
14 years 26 days ago
Bluetooth and sensor networks: a reality check
The current generation of sensor nodes rely on commodity components. The choice of the radio is particularly important as it impacts not only energy consumption but also software ...
Martin Leopold, Mads Bondo Dydensborg, Philippe Bo...
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
14 years 21 days ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...