Results 181 to 190 of about 8,384 (195)
Some of the next articles are maybe not open access.
Stealthy Dopant-Level Hardware Trojans
Lecture Notes in Computer Science, 2013Francesco Regazzoni, Christof Paar
exaly
Case study: Detecting hardware Trojans in third-party digital IP cores
2011Xuehui Zhang, Mohammad Tehranipoor
exaly
A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2014Kan Xiao, Domenic Forte
exaly
Hardware Trojans: current challenges and approaches
IET Computers and Digital Techniques, 2014Dominik Merli +2 more
exaly
On the Hardware Trojans and Confidentiality
2017Isa, Eleni, Sklavos, Nicolas
openaire +1 more source

