共 50 条
- [11] Fault-based Attacks on Cryptographic Hardware [J]. PROCEEDINGS OF THE 2013 IEEE 16TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS), 2013, : 12 - 17
- [14] Energy security in a multi-level governance perspective [J]. MARINE POLICY, 2018, 98 : 301 - 308
- [15] Multi-Level Proactive Security Auditing for Clouds [J]. 2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2019, : 219 - 226
- [16] Multi-Level Security Embedded With Surveillance System [J]. IEEE SENSORS JOURNAL, 2017, 17 (22) : 7497 - 7501
- [17] Hardware Attacks and Security Education [J]. PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, : 253 - 257
- [19] Boundary Scan Security Enhancements for a Cryptographic Hardware [J]. COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2009, 2009, 5717 : 91 - 97
- [20] Cryptographic Security Through a Hardware Root of Trust [J]. APPLIED RECONFIGURABLE COMPUTING. ARCHITECTURES, TOOLS, AND APPLICATIONS, ARC 2024, 2024, 14553 : 106 - 119