Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("hardware trojan")

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 4 of 4

  • Page / 1
Export

Selection :

  • and

Scalable Hardware Trojan DiagnosisSHENG WEI; POTKONJAK, Miodrag.IEEE transactions on very large scale integration (VLSI) systems. 2012, Vol 20, Num 6, pp 1049-1057, issn 1063-8210, 9 p.Article

On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis : TRUSTWORTHY MANUFACTURING AND UTILIZATION OF SECURE DEVICESDUPUIS, Sophie; DI NATALE, Giorgio; FLOTTES, Marie-Lise et al.Information security journal (Print). 2013, Vol 22, Num 4-6, pp 226-236, issn 1939-3555, 11 p.Conference Paper

Hardware Trojan Attacks: Threat Analysis and CountermeasuresBHUNIA, Swarup; HSIAO, Michael S; BANGA, Mainak et al.Proceedings of the IEEE. 2014, Vol 102, Num 8, pp 1229-1247, issn 0018-9219, 19 p.Article

A Timing Channel Spyware for the CSMA/CA ProtocolKIYAVASH, Negar; KOUSHANFAR, Farinaz; COLEMAN, Todd P et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 3-4, pp 477-487, issn 1556-6013, 11 p.Article

  • Page / 1