Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Rodica Tirtea"'
Publikováno v:
2007 5th IEEE International Conference on Industrial Informatics.
Side-channel attacks (i.e. fault analysis attacks) exploit vulnerabilities generated by faults in cryptographic implementations. Given the consequences of a successful attack (which can retrieve key information with a quite low cost), error detection
Autor:
Geert Deconinck, Rodica Tirtea
Publikováno v:
2007 5th IEEE International Conference on Industrial Informatics.
In this paper, the software rejuvenation model, designed for a continuously running non-replicated application, is extended for the case of distributed systems with rejuvenated replicated services. It identifies to which extent an increase in availab
Autor:
Koen Vanthournout, Johan Driesen, Geert Deconinck, Adrian Dusa, Ronnie Belmans, Rodica Tirtea, Tom Rigole
Publikováno v:
SMC
Electrical energy applications rely ever more on an information infrastructure (info'structure), consisting of heterogeneous off-the-shelf information and communication technology for hardware, software and networking. This provides flexibility for t
Publikováno v:
RAMS '06. Annual Reliability and Maintainability Symposium, 2006..
Due to deregulation of electricity market and the trend towards distributed electricity generation based on renewable energy (e.g. wind energy), electric power infrastructure relies increasingly on communication infrastructure. Communication infrastr
Publikováno v:
Scopus-Elsevier
In this paper we extend the model to cover two aspects. On one hand the case of replicated services/applications used in distributed architectures with fault tolerance requirements. On the other hand the possibilities of processes/tasks to restart/mi
Publikováno v:
Scopus-Elsevier
Distributed heterogeneous embedded systems involved in the control of infrastructures, such as electric power infrastructure, need to ensure reliable services regardless of faults and changes in the environment. A fault tolerance middleware architect
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5e183814952207b05a7e508eb6ac75dd
http://www.scopus.com/inward/record.url?eid=2-s2.0-2342462803&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-2342462803&partnerID=MN8TOARS
Autor:
Geert Deconinck, Rodica Tirtea
Publikováno v:
Scopus-Elsevier
In 2001, after a selection process, NIST added the counter mode of operation to be used with the advanced encryption standard (AES). In the NIST recommendation a standard incrementing function is defined for generation of the counter blocks which are
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::067118be82beed752bc86593c03b09a9
http://www.scopus.com/inward/record.url?eid=2-s2.0-8744277293&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-8744277293&partnerID=MN8TOARS