„hardware security“
Suchergebnisse
550 Treffer
-
Security Policy in System-on-Chip Designs – Specification, Implementation and Verification
-
Smart Innovations in Communication and Computational Sciences – Proceedings of ICSICCS 2017, Volume 2
-
Defending IoT Infrastructures with the Raspberry Pi – Monitoring and Detecting Nefarious Behavior in Real Time
-
Smart Innovations in Communication and Computational Sciences – Proceedings of ICSICCS 2017, Volume 1
-
VLSI Design: Circuits, Systems and Applications – Select Proceedings of ICNETS2, Volume V
-
Trusted Digital Circuits – Hardware Trojan Vulnerabilities, Prevention and Detection
-
Fault Tolerant Architectures for Cryptography and Hardware Security
-
Advances in Computer and Computational Sciences – Proceedings of ICCCCS 2016, Volume 2
-
LifeLine for FPGA protection: obfuscated cryptography for real-world security
-
Cyber-Physical Attack Recovery Procedures – A Step-by-Step Preparation and Response Guide
-
Security of Block Ciphers – From Algorithm Design to Hardware Implementation
-
Organic Computing Doctoral Dissertation Colloquium 2015
-
Counterfeit Integrated Circuits – Detection and Avoidance
-
Secure System Design and Trustable Computing
-
Trust and Trustworthy Computing – 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings
-
Timing Channels in Cryptography – A Micro-Architectural Perspective
-
Trusted Computing for Embedded Systems
-
Hardware-based Computer Security Techniques to Defeat Hackers – From Biometrics to Quantum Cryptography
-
Coronal Magnetometry
-
Computer Safety, Reliability, and Security – 33rd International Conference, SAFECOMP 2014, Florence, Italy, September 10-12, 2014. Proceedings