共 50 条
- [4] Hardware-based IT security - Security Token Technologies in Automation [J]. ATP EDITION, 2012, (03): : 42 - 49
- [5] Security by design: Hardware-based Security in Windows 8 [J]. Comput. Fraud Secur., 2013, 5 (18-20):
- [6] Fault-based Attacks on Cryptographic Hardware [J]. PROCEEDINGS OF THE 2013 IEEE 16TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS), 2013, : 12 - 17
- [7] Investigation and Design of the Efficient Hardware-based RNG for Cryptographic Applications [J]. 2014 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN (ICED), 2014, : 255 - 260
- [8] Privacy Enhancements for Hardware-Based Security Modules [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2011, 130 : 224 - +
- [10] Multi-level Attacks: an Emerging Security Concern for Cryptographic Hardware [J]. 2011 DESIGN, AUTOMATION & TEST IN EUROPE (DATE), 2011, : 1176 - 1179