\n \n \n
\n
\n\n \n \n \n \n \n \n A million-bit multiplier architecture for fully homomorphic encryption.\n \n \n \n \n\n\n \n Yarkin Doröz; Erdinç Öztürk; and Berk Sunar.\n\n\n \n\n\n\n
Microprocess. Microsystems, 38(8): 766–775. 2014.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/mam/DorozOS14,\n\ttitle = {A million-bit multiplier architecture for fully homomorphic encryption},\n\tauthor = {Yarkin Dor{\\"{o}}z and Erdin{\\c{c}} {\\"{O}}zt{\\"{u}}rk and Berk Sunar},\n\tyear = 2014,\n\tjournal = {Microprocess. Microsystems},\n\tvolume = 38,\n\tnumber = 8,\n\tpages = {766--775},\n\tdoi = {10.1016/j.micpro.2014.06.003},\n\turl = {https://doi.org/10.1016/j.micpro.2014.06.003},\n\ttimestamp = {Sat, 22 Feb 2020 00:00:00 +0100},\n\tbiburl = {https://dblp.org/rec/journals/mam/DorozOS14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Fine Grain Cross-VM Attacks on Xen and VMware.\n \n \n \n \n\n\n \n Gorka Irazoqui Apecechea; Mehmet Sinan Inci; Thomas Eisenbarth; and Berk Sunar.\n\n\n \n\n\n\n In
2014 IEEE Fourth International Conference on Big Data and Cloud Computing, BDCloud 2014, Sydney, Australia, December 3-5, 2014, pages 737–744, 2014. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/bdcloud/ApececheaIES14,\n\ttitle = {Fine Grain Cross-VM Attacks on Xen and VMware},\n\tauthor = {Gorka Irazoqui Apecechea and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar},\n\tyear = 2014,\n\tbooktitle = {2014 {IEEE} Fourth International Conference on Big Data and Cloud Computing, BDCloud 2014, Sydney, Australia, December 3-5, 2014},\n\tpublisher = {{IEEE} Computer Society},\n\tpages = {737--744},\n\tdoi = {10.1109/BDCloud.2014.102},\n\turl = {https://doi.org/10.1109/BDCloud.2014.102},\n\ttimestamp = {Fri, 24 Mar 2023 00:00:00 +0100},\n\tbiburl = {https://dblp.org/rec/conf/bdcloud/ApececheaIES14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Bandwidth Efficient PIR from NTRU.\n \n \n \n \n\n\n \n Yarkin Doröz; Berk Sunar; and Ghaith Hammouri.\n\n\n \n\n\n\n In Rainer Böhme; Michael Brenner; Tyler Moore; and Matthew Smith., editor(s),
Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers, volume 8438, of
Lecture Notes in Computer Science, pages 195–207, 2014. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/fc/DorozSH14,\n\ttitle = {Bandwidth Efficient {PIR} from {NTRU}},\n\tauthor = {Yarkin Dor{\\"{o}}z and Berk Sunar and Ghaith Hammouri},\n\tyear = 2014,\n\tbooktitle = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN} and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers},\n\tpublisher = {Springer},\n\tseries = {Lecture Notes in Computer Science},\n\tvolume = 8438,\n\tpages = {195--207},\n\tdoi = {10.1007/978-3-662-44774-1\\_16},\n\turl = {https://doi.org/10.1007/978-3-662-44774-1\\_16},\n\teditor = {Rainer B{\\"{o}}hme and Michael Brenner and Tyler Moore and Matthew Smith},\n\ttimestamp = {Wed, 12 Aug 2020 17:59:02 +0200},\n\tbiburl = {https://dblp.org/rec/conf/fc/DorozSH14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince.\n \n \n \n \n\n\n \n Yarkin Doröz; Aria Shahverdi; Thomas Eisenbarth; and Berk Sunar.\n\n\n \n\n\n\n In Rainer Böhme; Michael Brenner; Tyler Moore; and Matthew Smith., editor(s),
Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers, volume 8438, of
Lecture Notes in Computer Science, pages 208–220, 2014. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/fc/DorozSES14,\n\ttitle = {Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince},\n\tauthor = {Yarkin Dor{\\"{o}}z and Aria Shahverdi and Thomas Eisenbarth and Berk Sunar},\n\tyear = 2014,\n\tbooktitle = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN} and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers},\n\tpublisher = {Springer},\n\tseries = {Lecture Notes in Computer Science},\n\tvolume = 8438,\n\tpages = {208--220},\n\tdoi = {10.1007/978-3-662-44774-1\\_17},\n\turl = {https://doi.org/10.1007/978-3-662-44774-1\\_17},\n\teditor = {Rainer B{\\"{o}}hme and Michael Brenner and Tyler Moore and Matthew Smith},\n\ttimestamp = {Fri, 08 Mar 2019 00:00:00 +0100},\n\tbiburl = {https://dblp.org/rec/conf/fc/DorozSES14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Accelerating NTRU based homomorphic encryption using GPUs.\n \n \n \n \n\n\n \n Wei Dai; Yarkin Doröz; and Berk Sunar.\n\n\n \n\n\n\n In
IEEE High Performance Extreme Computing Conference, HPEC 2014, Waltham, MA, USA, September 9-11, 2014, pages 1–6, 2014. IEEE\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/hpec/DaiDS14,\n\ttitle = {Accelerating {NTRU} based homomorphic encryption using GPUs},\n\tauthor = {Wei Dai and Yarkin Dor{\\"{o}}z and Berk Sunar},\n\tyear = 2014,\n\tbooktitle = {{IEEE} High Performance Extreme Computing Conference, {HPEC} 2014, Waltham, MA, USA, September 9-11, 2014},\n\tpublisher = {{IEEE}},\n\tpages = {1--6},\n\tdoi = {10.1109/HPEC.2014.7041001},\n\turl = {https://doi.org/10.1109/HPEC.2014.7041001},\n\ttimestamp = {Wed, 16 Oct 2019 14:14:52 +0200},\n\tbiburl = {https://dblp.org/rec/conf/hpec/DaiDS14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Practical homomorphic encryption: A survey.\n \n \n \n \n\n\n \n Ciara Moore; Máire O'Neill; Elizabeth O'Sullivan; Yarkin Doröz; and Berk Sunar.\n\n\n \n\n\n\n In
IEEE International Symposium on Circuits and Systemss, ISCAS 2014, Melbourne, Victoria, Australia, June 1-5, 2014, pages 2792–2795, 2014. IEEE\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iscas/MooreOODS14,\n\ttitle = {Practical homomorphic encryption: {A} survey},\n\tauthor = {Ciara Moore and M{\\'{a}}ire O'Neill and Elizabeth O'Sullivan and Yarkin Dor{\\"{o}}z and Berk Sunar},\n\tyear = 2014,\n\tbooktitle = {{IEEE} International Symposium on Circuits and Systemss, {ISCAS} 2014, Melbourne, Victoria, Australia, June 1-5, 2014},\n\tpublisher = {{IEEE}},\n\tpages = {2792--2795},\n\tdoi = {10.1109/ISCAS.2014.6865753},\n\turl = {https://doi.org/10.1109/ISCAS.2014.6865753},\n\ttimestamp = {Wed, 16 Oct 2019 14:14:49 +0200},\n\tbiburl = {https://dblp.org/rec/conf/iscas/MooreOODS14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Wait a Minute! A fast, Cross-VM Attack on AES.\n \n \n \n \n\n\n \n Gorka Irazoqui Apecechea; Mehmet Sinan Inci; Thomas Eisenbarth; and Berk Sunar.\n\n\n \n\n\n\n In Angelos Stavrou; Herbert Bos; and Georgios Portokalidis., editor(s),
Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings, volume 8688, of
Lecture Notes in Computer Science, pages 299–319, 2014. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/raid/ApececheaIES14,\n\ttitle = {Wait a Minute! {A} fast, Cross-VM Attack on {AES}},\n\tauthor = {Gorka Irazoqui Apecechea and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar},\n\tyear = 2014,\n\tbooktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings},\n\tpublisher = {Springer},\n\tseries = {Lecture Notes in Computer Science},\n\tvolume = 8688,\n\tpages = {299--319},\n\tdoi = {10.1007/978-3-319-11379-1\\_15},\n\turl = {https://doi.org/10.1007/978-3-319-11379-1\\_15},\n\teditor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis},\n\ttimestamp = {Tue, 14 May 2019 10:00:53 +0200},\n\tbiburl = {https://dblp.org/rec/conf/raid/ApececheaIES14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Homomorphic AES Evaluation using NTRU.\n \n \n \n \n\n\n \n Yarkin Doröz; Yin Hu; and Berk Sunar.\n\n\n \n\n\n\n
IACR Cryptol. ePrint Arch.,39. 2014.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/iacr/DorozHS14,\n\ttitle = {Homomorphic {AES} Evaluation using {NTRU}},\n\tauthor = {Yarkin Dor{\\"{o}}z and Yin Hu and Berk Sunar},\n\tyear = 2014,\n\tjournal = {{IACR} Cryptol. ePrint Arch.},\n\tpages = 39,\n\turl = {http://eprint.iacr.org/2014/039},\n\ttimestamp = {Mon, 11 May 2020 01:00:00 +0200},\n\tbiburl = {https://dblp.org/rec/journals/iacr/DorozHS14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Fine grain Cross-VM Attacks on Xen and VMware are possible!.\n \n \n \n \n\n\n \n Gorka Irazoqui Apecechea; Mehmet Sinan Inci; Thomas Eisenbarth; and Berk Sunar.\n\n\n \n\n\n\n
IACR Cryptol. ePrint Arch.,248. 2014.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/iacr/ApececheaIES14,\n\ttitle = {Fine grain Cross-VM Attacks on Xen and VMware are possible!},\n\tauthor = {Gorka Irazoqui Apecechea and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar},\n\tyear = 2014,\n\tjournal = {{IACR} Cryptol. ePrint Arch.},\n\tpages = 248,\n\turl = {http://eprint.iacr.org/2014/248},\n\ttimestamp = {Mon, 11 May 2020 01:00:00 +0200},\n\tbiburl = {https://dblp.org/rec/journals/iacr/ApececheaIES14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Jackpot Stealing Information From Large Caches via Huge Pages.\n \n \n \n \n\n\n \n Gorka Irazoqui Apecechea; Thomas Eisenbarth; and Berk Sunar.\n\n\n \n\n\n\n
IACR Cryptol. ePrint Arch.,970. 2014.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/iacr/ApececheaES14,\n\ttitle = {Jackpot Stealing Information From Large Caches via Huge Pages},\n\tauthor = {Gorka Irazoqui Apecechea and Thomas Eisenbarth and Berk Sunar},\n\tyear = 2014,\n\tjournal = {{IACR} Cryptol. ePrint Arch.},\n\tpages = 970,\n\turl = {http://eprint.iacr.org/2014/970},\n\ttimestamp = {Mon, 11 May 2020 01:00:00 +0200},\n\tbiburl = {https://dblp.org/rec/journals/iacr/ApececheaES14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Physical Characterization of Arbiter PUFs.\n \n \n \n \n\n\n \n Shahin Tajik; Enrico Dietz; Sven Frohmann; Jean-Pierre Seifert; Dmitry Nedospasov; Clemens Helfmeier; Christian Boit; and Helmar Dittrich.\n\n\n \n\n\n\n In Lejla Batina; and Matthew Robshaw., editor(s),
Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings, volume 8731, of
Lecture Notes in Computer Science, pages 493–509, 2014. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ches/TajikDFSNHBD14,\n\ttitle = {Physical Characterization of Arbiter PUFs},\n\tauthor = {Shahin Tajik and Enrico Dietz and Sven Frohmann and Jean{-}Pierre Seifert and Dmitry Nedospasov and Clemens Helfmeier and Christian Boit and Helmar Dittrich},\n\tyear = 2014,\n\tbooktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},\n\tpublisher = {Springer},\n\tseries = {Lecture Notes in Computer Science},\n\tvolume = 8731,\n\tpages = {493--509},\n\tdoi = {10.1007/978-3-662-44709-3\\_27},\n\turl = {https://doi.org/10.1007/978-3-662-44709-3\\_27},\n\teditor = {Lejla Batina and Matthew Robshaw},\n\ttimestamp = {Mon, 26 Jun 2023 01:00:00 +0200},\n\tbiburl = {https://dblp.org/rec/conf/ches/TajikDFSNHBD14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Physical vulnerabilities of Physically Unclonable Functions.\n \n \n \n \n\n\n \n Clemens Helfmeier; Christian Boit; Dmitry Nedospasov; Shahin Tajik; and Jean-Pierre Seifert.\n\n\n \n\n\n\n In Gerhard P. Fettweis; and Wolfgang Nebel., editor(s),
Design, Automation & Test in Europe Conference & Exhibition, DATE 2014, Dresden, Germany, March 24-28, 2014, pages 1–4, 2014. European Design and Automation Association\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/date/HelfmeierBNTS14,\n\ttitle = {Physical vulnerabilities of Physically Unclonable Functions},\n\tauthor = {Clemens Helfmeier and Christian Boit and Dmitry Nedospasov and Shahin Tajik and Jean{-}Pierre Seifert},\n\tyear = 2014,\n\tbooktitle = {Design, Automation {\\&} Test in Europe Conference {\\&} Exhibition, {DATE} 2014, Dresden, Germany, March 24-28, 2014},\n\tpublisher = {European Design and Automation Association},\n\tpages = {1--4},\n\tdoi = {10.7873/DATE.2014.363},\n\turl = {https://doi.org/10.7873/DATE.2014.363},\n\teditor = {Gerhard P. Fettweis and Wolfgang Nebel},\n\ttimestamp = {Wed, 16 Oct 2019 14:14:53 +0200},\n\tbiburl = {https://dblp.org/rec/conf/date/HelfmeierBNTS14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Emission Analysis of Hardware Implementations.\n \n \n \n \n\n\n \n Shahin Tajik; Dmitry Nedospasov; Clemens Helfmeier; Jean-Pierre Seifert; and Christian Boit.\n\n\n \n\n\n\n In
17th Euromicro Conference on Digital System Design, DSD 2014, Verona, Italy, August 27-29, 2014, pages 528–534, 2014. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dsd/TajikNHSB14,\n\ttitle = {Emission Analysis of Hardware Implementations},\n\tauthor = {Shahin Tajik and Dmitry Nedospasov and Clemens Helfmeier and Jean{-}Pierre Seifert and Christian Boit},\n\tyear = 2014,\n\tbooktitle = {17th Euromicro Conference on Digital System Design, {DSD} 2014, Verona, Italy, August 27-29, 2014},\n\tpublisher = {{IEEE} Computer Society},\n\tpages = {528--534},\n\tdoi = {10.1109/DSD.2014.64},\n\turl = {https://doi.org/10.1109/DSD.2014.64},\n\ttimestamp = {Thu, 23 Mar 2023 00:00:00 +0100},\n\tbiburl = {https://dblp.org/rec/conf/dsd/TajikNHSB14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Multi-sensor Finger Ring for Authentication Based on 3D Signatures.\n \n \n \n \n\n\n \n Mehran Roshandel; Aarti Munjal; Peyman Moghadam; Shahin Tajik; and Hamed Ketabdar.\n\n\n \n\n\n\n In Masaaki Kurosu., editor(s),
Human-Computer Interaction. Advanced Interaction Modalities and Techniques - 16th International Conference, HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part II, volume 8511, of
Lecture Notes in Computer Science, pages 131–138, 2014. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/hci/RoshandelMMTK14,\n\ttitle = {Multi-sensor Finger Ring for Authentication Based on 3D Signatures},\n\tauthor = {Mehran Roshandel and Aarti Munjal and Peyman Moghadam and Shahin Tajik and Hamed Ketabdar},\n\tyear = 2014,\n\tbooktitle = {Human-Computer Interaction. Advanced Interaction Modalities and Techniques - 16th International Conference, {HCI} International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part {II}},\n\tpublisher = {Springer},\n\tseries = {Lecture Notes in Computer Science},\n\tvolume = 8511,\n\tpages = {131--138},\n\tdoi = {10.1007/978-3-319-07230-2\\_13},\n\turl = {https://doi.org/10.1007/978-3-319-07230-2\\_13},\n\teditor = {Masaaki Kurosu},\n\ttimestamp = {Tue, 14 May 2019 10:00:43 +0200},\n\tbiburl = {https://dblp.org/rec/conf/hci/RoshandelMMTK14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Multi-sensor Based Gestures Recognition with a Smart Finger Ring.\n \n \n \n \n\n\n \n Mehran Roshandel; Aarti Munjal; Peyman Moghadam; Shahin Tajik; and Hamed Ketabdar.\n\n\n \n\n\n\n In Masaaki Kurosu., editor(s),
Human-Computer Interaction. Advanced Interaction Modalities and Techniques - 16th International Conference, HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part II, volume 8511, of
Lecture Notes in Computer Science, pages 316–324, 2014. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/hci/RoshandelMMTK14a,\n\ttitle = {Multi-sensor Based Gestures Recognition with a Smart Finger Ring},\n\tauthor = {Mehran Roshandel and Aarti Munjal and Peyman Moghadam and Shahin Tajik and Hamed Ketabdar},\n\tyear = 2014,\n\tbooktitle = {Human-Computer Interaction. Advanced Interaction Modalities and Techniques - 16th International Conference, {HCI} International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part {II}},\n\tpublisher = {Springer},\n\tseries = {Lecture Notes in Computer Science},\n\tvolume = 8511,\n\tpages = {316--324},\n\tdoi = {10.1007/978-3-319-07230-2\\_31},\n\turl = {https://doi.org/10.1007/978-3-319-07230-2\\_31},\n\teditor = {Masaaki Kurosu},\n\ttimestamp = {Wed, 24 May 2017 01:00:00 +0200},\n\tbiburl = {https://dblp.org/rec/conf/hci/RoshandelMMTK14a.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n SIMON Says: Break Area Records of Block Ciphers on FPGAs.\n \n \n \n \n\n\n \n Aydin Aysu; Ege Gulcan; and Patrick Schaumont.\n\n\n \n\n\n\n
IEEE Embed. Syst. Lett., 6(2): 37–40. 2014.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/esl/AysuGS14,\n\ttitle = {{SIMON} Says: Break Area Records of Block Ciphers on FPGAs},\n\tauthor = {Aydin Aysu and Ege Gulcan and Patrick Schaumont},\n\tyear = 2014,\n\tjournal = {{IEEE} Embed. Syst. Lett.},\n\tvolume = 6,\n\tnumber = 2,\n\tpages = {37--40},\n\tdoi = {10.1109/LES.2014.2314961},\n\turl = {https://doi.org/10.1109/LES.2014.2314961},\n\ttimestamp = {Thu, 10 Sep 2020 01:00:00 +0200},\n\tbiburl = {https://dblp.org/rec/journals/esl/AysuGS14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n The Impact of Aging on a Physical Unclonable Function.\n \n \n \n \n\n\n \n Abhranil Maiti; and Patrick Schaumont.\n\n\n \n\n\n\n
IEEE Trans. Very Large Scale Integr. Syst., 22(9): 1854–1864. 2014.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/tvlsi/MaitiS14,\n\ttitle = {The Impact of Aging on a Physical Unclonable Function},\n\tauthor = {Abhranil Maiti and Patrick Schaumont},\n\tyear = 2014,\n\tjournal = {{IEEE} Trans. Very Large Scale Integr. Syst.},\n\tvolume = 22,\n\tnumber = 9,\n\tpages = {1854--1864},\n\tdoi = {10.1109/TVLSI.2013.2279875},\n\turl = {https://doi.org/10.1109/TVLSI.2013.2279875},\n\ttimestamp = {Mon, 15 Jun 2020 01:00:00 +0200},\n\tbiburl = {https://dblp.org/rec/journals/tvlsi/MaitiS14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n QMS: Evaluating the Side-Channel Resistance of Masked Software from Source Code.\n \n \n \n \n\n\n \n Hassan Eldib; Chao Wang; Mostafa M. I. Taha; and Patrick Schaumont.\n\n\n \n\n\n\n In
The 51st Annual Design Automation Conference 2014, DAC '14, San Francisco, CA, USA, June 1-5, 2014, pages 209:1–209:6, 2014. ACM\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dac/EldibWTS14,\n\ttitle = {{QMS:} Evaluating the Side-Channel Resistance of Masked Software from Source Code},\n\tauthor = {Hassan Eldib and Chao Wang and Mostafa M. I. Taha and Patrick Schaumont},\n\tyear = 2014,\n\tbooktitle = {The 51st Annual Design Automation Conference 2014, {DAC} '14, San Francisco, CA, USA, June 1-5, 2014},\n\tpublisher = {{ACM}},\n\tpages = {209:1--209:6},\n\tdoi = {10.1145/2593069.2593193},\n\turl = {https://doi.org/10.1145/2593069.2593193},\n\ttimestamp = {Mon, 15 Jun 2020 01:00:00 +0200},\n\tbiburl = {https://dblp.org/rec/conf/dac/EldibWTS14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Analyzing and eliminating the causes of fault sensitivity analysis.\n \n \n \n \n\n\n \n Nahid Farhady Ghalaty; Aydin Aysu; and Patrick Schaumont.\n\n\n \n\n\n\n In Gerhard P. Fettweis; and Wolfgang Nebel., editor(s),
Design, Automation & Test in Europe Conference & Exhibition, DATE 2014, Dresden, Germany, March 24-28, 2014, pages 1–6, 2014. European Design and Automation Association\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/date/GhalatyAS14,\n\ttitle = {Analyzing and eliminating the causes of fault sensitivity analysis},\n\tauthor = {Nahid Farhady Ghalaty and Aydin Aysu and Patrick Schaumont},\n\tyear = 2014,\n\tbooktitle = {Design, Automation {\\&} Test in Europe Conference {\\&} Exhibition, {DATE} 2014, Dresden, Germany, March 24-28, 2014},\n\tpublisher = {European Design and Automation Association},\n\tpages = {1--6},\n\tdoi = {10.7873/DATE.2014.217},\n\turl = {https://doi.org/10.7873/DATE.2014.217},\n\teditor = {Gerhard P. Fettweis and Wolfgang Nebel},\n\ttimestamp = {Mon, 15 Jun 2020 01:00:00 +0200},\n\tbiburl = {https://dblp.org/rec/conf/date/GhalatyAS14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Differential Fault Intensity Analysis.\n \n \n \n \n\n\n \n Nahid Farhady Ghalaty; Bilgiday Yuce; Mostafa M. I. Taha; and Patrick Schaumont.\n\n\n \n\n\n\n In Assia Tria; and Dooho Choi., editor(s),
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2014, Busan, South Korea, September 23, 2014, pages 49–58, 2014. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/fdtc/GhalatyYTS14,\n\ttitle = {Differential Fault Intensity Analysis},\n\tauthor = {Nahid Farhady Ghalaty and Bilgiday Yuce and Mostafa M. I. Taha and Patrick Schaumont},\n\tyear = 2014,\n\tbooktitle = {2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2014, Busan, South Korea, September 23, 2014},\n\tpublisher = {{IEEE} Computer Society},\n\tpages = {49--58},\n\tdoi = {10.1109/FDTC.2014.15},\n\turl = {https://doi.org/10.1109/FDTC.2014.15},\n\teditor = {Assia Tria and Dooho Choi},\n\ttimestamp = {Fri, 24 Mar 2023 00:00:00 +0100},\n\tbiburl = {https://dblp.org/rec/conf/fdtc/GhalatyYTS14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Hardware-software co-design for heterogeneous multiprocessor sensor nodes.\n \n \n \n \n\n\n \n Jingyao Zhang; Srikrishna Iyer; Xiangwei Zheng; Patrick Schaumont; and Yaling Yang.\n\n\n \n\n\n\n In
IEEE Global Communications Conference, GLOBECOM 2014, Austin, TX, USA, December 8-12, 2014, pages 20–25, 2014. IEEE\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/globecom/ZhangIZSY14,\n\ttitle = {Hardware-software co-design for heterogeneous multiprocessor sensor nodes},\n\tauthor = {Jingyao Zhang and Srikrishna Iyer and Xiangwei Zheng and Patrick Schaumont and Yaling Yang},\n\tyear = 2014,\n\tbooktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2014, Austin, TX, USA, December 8-12, 2014},\n\tpublisher = {{IEEE}},\n\tpages = {20--25},\n\tdoi = {10.1109/GLOCOM.2014.7036778},\n\turl = {https://doi.org/10.1109/GLOCOM.2014.7036778},\n\ttimestamp = {Mon, 15 Jun 2020 01:00:00 +0200},\n\tbiburl = {https://dblp.org/rec/conf/globecom/ZhangIZSY14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Side-channel countermeasure for SHA-3 at almost-zero area overhead.\n \n \n \n \n\n\n \n Mostafa M. I. Taha; and Patrick Schaumont.\n\n\n \n\n\n\n In
2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pages 93–96, 2014. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/host/TahaS14,\n\ttitle = {Side-channel countermeasure for {SHA-3} at almost-zero area overhead},\n\tauthor = {Mostafa M. I. Taha and Patrick Schaumont},\n\tyear = 2014,\n\tbooktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},\n\tpublisher = {{IEEE} Computer Society},\n\tpages = {93--96},\n\tdoi = {10.1109/HST.2014.6855576},\n\turl = {https://doi.org/10.1109/HST.2014.6855576},\n\ttimestamp = {Fri, 24 Mar 2023 00:00:00 +0100},\n\tbiburl = {https://dblp.org/rec/conf/host/TahaS14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A Flexible and Compact Hardware Architecture for the SIMON Block Cipher.\n \n \n \n \n\n\n \n Ege Gulcan; Aydin Aysu; and Patrick Schaumont.\n\n\n \n\n\n\n In Thomas Eisenbarth; and Erdinç Öztürk., editor(s),
Lightweight Cryptography for Security and Privacy - Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers, volume 8898, of
Lecture Notes in Computer Science, pages 34–50, 2014. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/lightsec/GulcanAS14,\n\ttitle = {A Flexible and Compact Hardware Architecture for the {SIMON} Block Cipher},\n\tauthor = {Ege Gulcan and Aydin Aysu and Patrick Schaumont},\n\tyear = 2014,\n\tbooktitle = {Lightweight Cryptography for Security and Privacy - Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers},\n\tpublisher = {Springer},\n\tseries = {Lecture Notes in Computer Science},\n\tvolume = 8898,\n\tpages = {34--50},\n\tdoi = {10.1007/978-3-319-16363-5\\_3},\n\turl = {https://doi.org/10.1007/978-3-319-16363-5\\_3},\n\teditor = {Thomas Eisenbarth and Erdin{\\c{c}} {\\"{O}}zt{\\"{u}}rk},\n\ttimestamp = {Tue, 14 May 2019 10:00:42 +0200},\n\tbiburl = {https://dblp.org/rec/conf/lightsec/GulcanAS14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node.\n \n \n \n \n\n\n \n Krishna Chaitanya Pabbuleti; Deepak Hanamant Mane; and Patrick Schaumont.\n\n\n \n\n\n\n In Nitesh Saxena; and Ahmad-Reza Sadeghi., editor(s),
Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers, volume 8651, of
Lecture Notes in Computer Science, pages 123–136, 2014. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/rfidsec/PabbuletiMS14,\n\ttitle = {Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node},\n\tauthor = {Krishna Chaitanya Pabbuleti and Deepak Hanamant Mane and Patrick Schaumont},\n\tyear = 2014,\n\tbooktitle = {Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers},\n\tpublisher = {Springer},\n\tseries = {Lecture Notes in Computer Science},\n\tvolume = 8651,\n\tpages = {123--136},\n\tdoi = {10.1007/978-3-319-13066-8\\_8},\n\turl = {https://doi.org/10.1007/978-3-319-13066-8\\_8},\n\teditor = {Nitesh Saxena and Ahmad{-}Reza Sadeghi},\n\ttimestamp = {Tue, 14 May 2019 10:00:38 +0200},\n\tbiburl = {https://dblp.org/rec/conf/rfidsec/PabbuletiMS14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n SMT-Based Verification of Software Countermeasures against Side-Channel Attacks.\n \n \n \n \n\n\n \n Hassan Eldib; Chao Wang; and Patrick Schaumont.\n\n\n \n\n\n\n In Erika Ábrahám; and Klaus Havelund., editor(s),
Tools and Algorithms for the Construction and Analysis of Systems - 20th International Conference, TACAS 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014. Proceedings, volume 8413, of
Lecture Notes in Computer Science, pages 62–77, 2014. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/tacas/EldibWS14,\n\ttitle = {SMT-Based Verification of Software Countermeasures against Side-Channel Attacks},\n\tauthor = {Hassan Eldib and Chao Wang and Patrick Schaumont},\n\tyear = 2014,\n\tbooktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 20th International Conference, {TACAS} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014. Proceedings},\n\tpublisher = {Springer},\n\tseries = {Lecture Notes in Computer Science},\n\tvolume = 8413,\n\tpages = {62--77},\n\tdoi = {10.1007/978-3-642-54862-8\\_5},\n\turl = {https://doi.org/10.1007/978-3-642-54862-8\\_5},\n\teditor = {Erika {\\'{A}}brah{\\'{a}}m and Klaus Havelund},\n\ttimestamp = {Tue, 14 May 2019 10:00:53 +0200},\n\tbiburl = {https://dblp.org/rec/conf/tacas/EldibWS14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings.\n \n \n \n \n\n\n \n Rajat Subhra Chakraborty; Vashek Matyas; and Patrick Schaumont.,\n editors.\n \n\n\n \n\n\n\n Volume 8804, of Lecture Notes in Computer Science.Springer. 2014.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@proceedings{DBLP:conf/space/2014,\n\ttitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},\n\tyear = 2014,\n\tpublisher = {Springer},\n\tseries = {Lecture Notes in Computer Science},\n\tvolume = 8804,\n\tdoi = {10.1007/978-3-319-12060-7},\n\tisbn = {978-3-319-12059-1},\n\turl = {https://doi.org/10.1007/978-3-319-12060-7},\n\teditor = {Rajat Subhra Chakraborty and Vashek Matyas and Patrick Schaumont},\n\ttimestamp = {Mon, 15 Jun 2020 01:00:00 +0200},\n\tbiburl = {https://dblp.org/rec/conf/space/2014.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs.\n \n \n \n \n\n\n \n Aydin Aysu; Ege Gulcan; and Patrick Schaumont.\n\n\n \n\n\n\n
IACR Cryptol. ePrint Arch.,237. 2014.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/iacr/AysuGS14,\n\ttitle = {{SIMON} Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs},\n\tauthor = {Aydin Aysu and Ege Gulcan and Patrick Schaumont},\n\tyear = 2014,\n\tjournal = {{IACR} Cryptol. ePrint Arch.},\n\tpages = 237,\n\turl = {http://eprint.iacr.org/2014/237},\n\ttimestamp = {Thu, 21 Jan 2021 00:00:00 +0100},\n\tbiburl = {https://dblp.org/rec/journals/iacr/AysuGS14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Design Methods for Secure Hardware (NII Shonan Meeting 2014-11).\n \n \n \n \n\n\n \n Kazuo Sakiyama; Patrick Schaumont; and Ingrid Verbauwhede.\n\n\n \n\n\n\n
NII Shonan Meet. Rep., 2014. 2014.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/shonan-reports/SakiyamaSV14,\n\ttitle = {Design Methods for Secure Hardware {(NII} Shonan Meeting 2014-11)},\n\tauthor = {Kazuo Sakiyama and Patrick Schaumont and Ingrid Verbauwhede},\n\tyear = 2014,\n\tjournal = {{NII} Shonan Meet. Rep.},\n\tvolume = 2014,\n\turl = {https://shonan.nii.ac.jp/seminars/028/},\n\ttimestamp = {Thu, 04 Mar 2021 00:00:00 +0100},\n\tbiburl = {https://dblp.org/rec/journals/shonan-reports/SakiyamaSV14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Dynamic Resource Provisioning for Energy Efficiency in Wireless Access Networks: A Survey and an Outlook.\n \n \n \n \n\n\n \n Lukasz Budzisz; Fatemeh Ganji; Gianluca Rizzo; Marco Ajmone Marsan; Michela Meo; Yi Zhang; George Koutitas; Leandros Tassiulas; Sofie Lambert; Bart Lannoo; Mario Pickavet; Alberto Conte; Ivaylo Haratcherev; and Adam Wolisz.\n\n\n \n\n\n\n
IEEE Commun. Surv. Tutorials, 16(4): 2259–2285. 2014.\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/comsur/BudziszGRMMZKTLLPCHW14,\n\ttitle = {Dynamic Resource Provisioning for Energy Efficiency in Wireless Access Networks: {A} Survey and an Outlook},\n\tauthor = {Lukasz Budzisz and Fatemeh Ganji and Gianluca Rizzo and Marco Ajmone Marsan and Michela Meo and Yi Zhang and George Koutitas and Leandros Tassiulas and Sofie Lambert and Bart Lannoo and Mario Pickavet and Alberto Conte and Ivaylo Haratcherev and Adam Wolisz},\n\tyear = 2014,\n\tjournal = {{IEEE} Commun. Surv. Tutorials},\n\tvolume = 16,\n\tnumber = 4,\n\tpages = {2259--2285},\n\tdoi = {10.1109/COMST.2014.2329505},\n\turl = {https://doi.org/10.1109/COMST.2014.2329505},\n\ttimestamp = {Thu, 09 Apr 2020 01:00:00 +0200},\n\tbiburl = {https://dblp.org/rec/journals/comsur/BudziszGRMMZKTLLPCHW14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n On detecting WLAN users communication attempts.\n \n \n \n \n\n\n \n Fatemeh Ganji; Anatolij Zubow; Lukasz Budzisz; and Adam Wolisz.\n\n\n \n\n\n\n In
7th IFIP Wireless and Mobile Networking Conference, WMNC 2014, Vilamoura, Portugal, May 20-22, 2014, pages 1–8, 2014. IEEE\n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/mwcn/GanjiZBW14,\n\ttitle = {On detecting {WLAN} users communication attempts},\n\tauthor = {Fatemeh Ganji and Anatolij Zubow and Lukasz Budzisz and Adam Wolisz},\n\tyear = 2014,\n\tbooktitle = {7th {IFIP} Wireless and Mobile Networking Conference, {WMNC} 2014, Vilamoura, Portugal, May 20-22, 2014},\n\tpublisher = {{IEEE}},\n\tpages = {1--8},\n\tdoi = {10.1109/WMNC.2014.6878861},\n\turl = {https://doi.org/10.1109/WMNC.2014.6878861},\n\ttimestamp = {Wed, 16 Oct 2019 14:14:52 +0200},\n\tbiburl = {https://dblp.org/rec/conf/mwcn/GanjiZBW14.bib},\n\tbibsource = {dblp computer science bibliography, https://dblp.org}\n}\n
\n
\n\n\n\n
\n\n\n\n\n\n