Ileana Buhan
Orcid: 0000-0001-5494-9164
According to our database1,
Ileana Buhan
authored at least 37 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Towards Explainable Side-Channel Leakage: Unveiling the Secrets of Microarchitecture.
IACR Cryptol. ePrint Arch., 2024
Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores.
IACR Cryptol. ePrint Arch., 2024
SoK: The apprentice guide to automated fault injection simulation for security evaluation.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market.
Proceedings of the Applied Reconfigurable Computing. Architectures, Tools, and Applications, 2024
2023
SoK: Assisted Fault Simulation - Existing Challenges and Opportunities Offered by AI.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks.
IEEE Trans. Inf. Forensics Secur., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Being Patient and Persistent: Optimizing An Early Stopping Strategy for Deep Learning in Profiled Attacks.
CoRR, 2021
Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2021
2020
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
2019
IACR Cryptol. ePrint Arch., 2019
2016
IACR Cryptol. ePrint Arch., 2016
2012
Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources.
IEEE Trans. Inf. Forensics Secur., 2012
2011
Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme.
IEEE Trans. Inf. Forensics Secur., 2011
Evaluation of a template protection approach to integrate fingerprint biometrics in a PIN-based payment infrastructure.
Electron. Commer. Res. Appl., 2011
2010
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
Proceedings of the Ubiquitous Intelligence and Computing - 7th International Conference, 2010
A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
2009
Datenschutz und Datensicherheit, 2009
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009
2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the 2008 16th European Signal Processing Conference, 2008
2007
Proceedings of the Advances in Biometrics, International Conference, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems.
Proceedings of the Advances in Biometrics, International Conference, 2006