|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 510 publication records. Showing 510 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Mohammad Tehranipoor, Jim Plusquellic (eds.) |
IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, Anaheim, CA, USA, June 9, 2008. Proceedings |
HOST |
2008 |
DBLP BibTeX RDF |
|
1 | Sylvain Guilley, Sumanta Chaudhuri, Jean-Luc Danger, Laurent Sauvage, Philippe Hoogvorst, Maxime Nassar, Tarik Graba, Vinh-Nga Vong |
Place-and-Route Impact on the Security of DPL Designs in FPGAs. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Eric Menendez, Ken Mai |
A High-Performance, Low-Overhead, Power-Analysis-Resistant, Single-Rail Logic Style. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jie Li, John C. Lach |
At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yier Jin, Yiorgos Makris |
Hardware Trojan Detection Using Path Delay Fingerprint. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Mainak Banga, Michael S. Hsiao |
A Region Based Approach for the Identification of Hardware Trojans. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Miron Abramovic |
A Solution for On-Line TRUST Validation. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jiawei Huang 0007, John C. Lach |
IC Activation and User Authentication for Security-Sensitive Systems. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Johann Großschädl, Tobias Vejda, Dan Page |
Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Tom Kean, David McLaren, Carol Marsh |
Verifying the Authenticity of Chip Designs with the DesignTag System. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #510 of 510 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6] |
|