The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "HOST"( http://dblp.L3S.de/Venues/HOST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/host

Publication years (Num. hits)
2008 (23) 2009 (18) 2010 (25) 2011 (31) 2012 (26) 2013 (27) 2014 (31) 2015 (31) 2016 (45) 2017 (49) 2018 (40) 2019 (26) 2020 (31) 2021 (29) 2022 (47) 2023 (31)
Publication types (Num. hits)
inproceedings(494) proceedings(16)
Venues (Conferences, Journals, ...)
HOST(510)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 510 publication records. Showing 510 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mohammad Tehranipoor, Jim Plusquellic (eds.) IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, Anaheim, CA, USA, June 9, 2008. Proceedings Search on Bibsonomy HOST The full citation details ... 2008 DBLP  BibTeX  RDF
1Sylvain Guilley, Sumanta Chaudhuri, Jean-Luc Danger, Laurent Sauvage, Philippe Hoogvorst, Maxime Nassar, Tarik Graba, Vinh-Nga Vong Place-and-Route Impact on the Security of DPL Designs in FPGAs. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Eric Menendez, Ken Mai A High-Performance, Low-Overhead, Power-Analysis-Resistant, Single-Rail Logic Style. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jie Li, John C. Lach At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yier Jin, Yiorgos Makris Hardware Trojan Detection Using Path Delay Fingerprint. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Mainak Banga, Michael S. Hsiao A Region Based Approach for the Identification of Hardware Trojans. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Miron Abramovic A Solution for On-Line TRUST Validation. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jiawei Huang 0007, John C. Lach IC Activation and User Authentication for Security-Sensitive Systems. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Johann Großschädl, Tobias Vejda, Dan Page Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Tom Kean, David McLaren, Carol Marsh Verifying the Authenticity of Chip Designs with the DesignTag System. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #510 of 510 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license