共 50 条
- [41] Resilient Hardware Trojans Detection based on Path Delay Measurements 2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 151 - 156
- [43] To Detect, Locate, and Mask Hardware Trojans in digital circuits by reverse engineering and functional ECO Proc Asia South Pac Des Autom Conf, (623-630):
- [44] Trustworthy Hardware Design with Logic Locking PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 180 - 181
- [45] Hardware fuzzy logic kit design PROCEEDINGS OF THE SIXTH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS I - III, 1997, : 1039 - 1043
- [46] A Process for the Detection of Design-Level Hardware Trojans Using Verification Methods 2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 729 - 734
- [47] To Detect, Locate, and Mask Hardware Trojans in Digital Circuits by Reverse Engineering and Functional ECO 2016 21ST ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2016, : 623 - 630
- [49] Hardware Realization of the Modular Exponentiation Operation in Cryptographic Systems Based on Binary and Multivalued Logic MIXDES 2009: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2009, : 271 - 275
- [50] Study of Hardware Trojans Based Security Vulnerabilities in Cyber Physical Systems 2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,