共 10 条
- [1] Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (21):
- [4] Key-based Obfuscation using HT-like Trigger Circuit for 128-bit AES Hardware IP Core [J]. 34TH IEEE INTERNATIONAL SYSTEM ON CHIP CONFERENCE (SOCC), 2021, : 164 - 169
- [5] Data Injection Attacks Using a Hardware Trojan on a Transmission Line [J]. 2018 JOINT IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY AND 2018 IEEE ASIA-PACIFIC SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC/APEMC), 2018, : 10 - 10
- [6] RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation [J]. 23RD INTERNATIONAL CONFERENCE ON VLSI DESIGN, 2010, : 405 - 410
- [7] Enhancing Data Security using Obfuscated 128-bit AES Algorithm - An Active Hardware Obfuscation Approach at RTL Level [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 401 - 406
- [8] Data Augmented Hardware Trojan Detection Using Label Spreading Algorithm Based Transductive Learning for Edge Computing-Assisted IoT Devices [J]. IEEE ACCESS, 2022, 10 : 102789 - 102803
- [10] Secure and energy-efficient data transmission framework for IoT-based healthcare applications using EMCQLR and EKECC [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (03): : 2999 - 3016