Behavioral Synthesis for Hardware Security
Resource URI: https://dblp.l3s.de/d2r/resource/publications/books/sp/22/KI2022
Home
|
Example Publications
Property
Value
dcterms:
bibliographicCitation
<
http://dblp.uni-trier.de/rec/bibtex/books/sp/22/KI2022
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Sheikh_Ariful_Islam
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Srinivas_Katkoori
>
swrc:
editor
<
https://dblp.l3s.de/d2r/resource/authors/Sheikh_Ariful_Islam
>
swrc:
editor
<
https://dblp.l3s.de/d2r/resource/authors/Srinivas_Katkoori
>
foaf:
homepage
<
http://dx.doi.org/doi.org%2F10.1007%2F978-3-030-78841-4
>
foaf:
homepage
<
https://doi.org/10.1007/978-3-030-78841-4
>
dc:
identifier
DBLP books/sp/22/KI2022
(xsd:string)
dc:
identifier
DOI doi.org%2F10.1007%2F978-3-030-78841-4
(xsd:string)
dc:
identifier
ISBN 978-3-030-78840-7
(xsd:string)
swrc:
isbn
ISBN 978-3-030-78840-7
(xsd:string)
dcterms:
issued
2022
(xsd:gYear)
rdfs:
label
Behavioral Synthesis for Hardware Security
(xsd:string)
is
dcterms:
partOf
of
<
https://dblp.l3s.de/d2r/resource/publications/books/sp/22/0013Y22
>
is
dcterms:
partOf
of
<
https://dblp.l3s.de/d2r/resource/publications/books/sp/22/AgrawalV22
>
is
dcterms:
partOf
of
<
https://dblp.l3s.de/d2r/resource/publications/books/sp/22/BadierLCG22
>
is
dcterms:
partOf
of
<
https://dblp.l3s.de/d2r/resource/publications/books/sp/22/BorowczakV22
>
is
dcterms:
partOf
of
<
https://dblp.l3s.de/d2r/resource/publications/books/sp/22/HuAWK22
>
is
dcterms:
partOf
of
<
https://dblp.l3s.de/d2r/resource/publications/books/sp/22/IslamK22
>
is
dcterms:
partOf
of
<
https://dblp.l3s.de/d2r/resource/publications/books/sp/22/IslamK22a
>
is
dcterms:
partOf
of
<
https://dblp.l3s.de/d2r/resource/publications/books/sp/22/KatkooriI22
>
is
dcterms:
partOf
of
<
https://dblp.l3s.de/d2r/resource/publications/books/sp/22/KonigsmarkRWC22
>
is
dcterms:
partOf
of
<
https://dblp.l3s.de/d2r/resource/publications/books/sp/22/LewandowskiK22
>
is
dcterms:
partOf
of
<
https://dblp.l3s.de/d2r/resource/publications/books/sp/22/PeterG22
>
is
dcterms:
partOf
of
<
https://dblp.l3s.de/d2r/resource/publications/books/sp/22/PilatoS0GK22
>
is
dcterms:
partOf
of
<
https://dblp.l3s.de/d2r/resource/publications/books/sp/22/SantikellurCB22
>
is
dcterms:
partOf
of
<
https://dblp.l3s.de/d2r/resource/publications/books/sp/22/SenguptaR22
>
is
dcterms:
partOf
of
<
https://dblp.l3s.de/d2r/resource/publications/books/sp/22/VeerannaS22
>
is
dcterms:
partOf
of
<
https://dblp.l3s.de/d2r/resource/publications/books/sp/22/ZareenK22
>
dc:
publisher
Springer International Publishing
(xsd:string)
is
owl:
sameAs
of
<
https://dblp.l3s.de/d2r/resource/collections/sp/22
>
owl:
sameAs
<
http://bibsonomy.org/uri/bibtexkey/books/sp/22/KI2022/dblp
>
owl:
sameAs
<
http://dblp.rkbexplorer.com/id/books/sp/22/KI2022
>
owl:
sameAs
<
urn:isbn:978-3-030-78840-7
>
rdfs:
seeAlso
<
http://amazon.com/s/ref=nb_ss_gw?field-keywords=978-3-030-78840-7
>
rdfs:
seeAlso
<
https://doi.org/10.1007/978-3-030-78841-4
>
dcterms:
tableOfContent
<
http://dblp.uni-trier.de/db/books/collections/KI2022.html
>
dc:
title
Behavioral Synthesis for Hardware Security
(xsd:string)
dc:
type
<
http://purl.org/dc/dcmitype/Text
>
rdf:
type
swrc:Book
rdf:
type
foaf:Document