共 50 条
- [2] Application of hardware-based IT security measures in automation networks [J]. AUTOMATION 2012, 2012, 2171 : 391 - 394
- [4] Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment [J]. IEEE ACCESS, 2020, 8 : 216689 - 216706
- [5] Application Study of Hardware-Based Security for Future Industrial IoT [J]. 2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 246 - 252
- [6] VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface [J]. PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 699 - 716
- [8] Hardware-based Cyber Threats [J]. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 259 - 266
- [10] Performance characterization of a data mining application via hardware-based monitoring [J]. COMMERCIAL APPLICATIONS FOR HIGH-PERFORMANCE COMPUTING, 2001, 4528 : 109 - 117