Cited By
View all- Sivanandam SSelvi Selvaraj SSrinivasan AChandrasekaran P(2016)Stronger public key encryption system withstanding RAM scraper like attacksSecurity and Communication Networks10.1002/sec.14549:12(1650-1662)Online publication date: 1-Aug-2016
- Nimgaonkar SGomathisankaran MMohanty S(2013)MEM-DnP--A Novel Energy Efficient Approach for Memory Integrity Detection and Protection in Embedded SystemsCircuits, Systems, and Signal Processing10.1007/s00034-013-9621-432:6(2581-2604)Online publication date: 1-Dec-2013
- Geneiatakis DPortokalidis GKemerlis VKeromytis AYu TDanezis GGligor V(2012)Adaptive defenses for commodity software through virtual application partitioningProceedings of the 2012 ACM conference on Computer and communications security10.1145/2382196.2382214(133-144)Online publication date: 16-Oct-2012
- Show More Cited By