共 41 条
- [1] A Secure Design-for-Test Infrastructure for Lifetime Security of SoCs [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2015, : 37 - 40
- [3] Invited Tutorial: Considerations in the Design and Verification of Microprocessors for Safety-Critical and Security-Critical Applications [J]. 2008 FORMAL METHODS IN COMPUTER-AIDED DESIGN, 2008, : 1 - 8
- [6] From Security-by-Design to the Identification of Security-Critical Deviations in Process Executions [J]. INFORMATION SYSTEMS IN THE BIG DATA ERA, 2018, 317 : 218 - 234
- [8] Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 248 - 268
- [9] A security model for an operating system for security-critical applications in small office and home environment [J]. Communications - Scientific Letters of the University of Žilina, 2009, 11 (03):
- [10] Systematic design and realization of security-critical inter-organizational workflows [J]. EADOPTION AND THE KNOWLEDGE ECONOMY: ISSUES, APPLICATIONS, CASE STUDIES, PTS 1 AND 2, 2004, 1 : 646 - 653