Exploring Power Side-Channel Challenges in Embedded Systems Security. Narimani, P., Wang, M., Planta, U., & Abbasi, A. CoRR, 2024.
Paper doi bibtex @article{DBLP:journals/corr/abs-2410-11563,
author = {Pouya Narimani and
Meng Wang and
Ulysse Planta and
Ali Abbasi},
title = {Exploring Power Side-Channel Challenges in Embedded Systems Security},
journal = {CoRR},
volume = {abs/2410.11563},
year = {2024},
url = {https://doi.org/10.48550/arXiv.2410.11563},
doi = {10.48550/ARXIV.2410.11563},
eprinttype = {arXiv},
eprint = {2410.11563},
timestamp = {Wed, 19 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2410-11563.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"joE9wJF53SjoLJ7x5","bibbaseid":"narimani-wang-planta-abbasi-exploringpowersidechannelchallengesinembeddedsystemssecurity-2024","author_short":["Narimani, P.","Wang, M.","Planta, U.","Abbasi, A."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Pouya"],"propositions":[],"lastnames":["Narimani"],"suffixes":[]},{"firstnames":["Meng"],"propositions":[],"lastnames":["Wang"],"suffixes":[]},{"firstnames":["Ulysse"],"propositions":[],"lastnames":["Planta"],"suffixes":[]},{"firstnames":["Ali"],"propositions":[],"lastnames":["Abbasi"],"suffixes":[]}],"title":"Exploring Power Side-Channel Challenges in Embedded Systems Security","journal":"CoRR","volume":"abs/2410.11563","year":"2024","url":"https://doi.org/10.48550/arXiv.2410.11563","doi":"10.48550/ARXIV.2410.11563","eprinttype":"arXiv","eprint":"2410.11563","timestamp":"Wed, 19 Mar 2025 00:00:00 +0100","biburl":"https://dblp.org/rec/journals/corr/abs-2410-11563.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/corr/abs-2410-11563,\n author = {Pouya Narimani and\n Meng Wang and\n Ulysse Planta and\n Ali Abbasi},\n title = {Exploring Power Side-Channel Challenges in Embedded Systems Security},\n journal = {CoRR},\n volume = {abs/2410.11563},\n year = {2024},\n url = {https://doi.org/10.48550/arXiv.2410.11563},\n doi = {10.48550/ARXIV.2410.11563},\n eprinttype = {arXiv},\n eprint = {2410.11563},\n timestamp = {Wed, 19 Mar 2025 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/corr/abs-2410-11563.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Narimani, P.","Wang, M.","Planta, U.","Abbasi, A."],"key":"DBLP:journals/corr/abs-2410-11563","id":"DBLP:journals/corr/abs-2410-11563","bibbaseid":"narimani-wang-planta-abbasi-exploringpowersidechannelchallengesinembeddedsystemssecurity-2024","role":"author","urls":{"Paper":"https://doi.org/10.48550/arXiv.2410.11563"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/73/2297-2.bib","dataSources":["9RRnqWppvSHbtx7rD"],"keywords":[],"search_terms":["exploring","power","side","channel","challenges","embedded","systems","security","narimani","wang","planta","abbasi"],"title":"Exploring Power Side-Channel Challenges in Embedded Systems Security","year":2024}