共 50 条
- [1] Detecting Malicious Modifications of Data in Third-Party Intellectual Property Cores [J]. 2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
- [3] CLAIMS AGAINST THIRD-PARTY RECIPIENTS OF TRUST PROPERTY [J]. CAMBRIDGE LAW JOURNAL, 2017, 76 (02): : 399 - 429
- [5] Protecting your intellectual property against third-party infringers and patents [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2014, 248
- [7] Third-party Relationships and Third-party Protection in the European Property Law Regulations [J]. RABELS ZEITSCHRIFT FUR AUSLANDISCHES UND INTERNATIONALES PRIVATRECHT, 2021, 85 (03): : 681 - 688
- [9] Formal Security Verification of Third Party Intellectual Property Cores For Information Leakage [J]. 2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 547 - 552