Results 181 to 190 of about 8,384 (195)
Some of the next articles are maybe not open access.

Stealthy Dopant-Level Hardware Trojans

Lecture Notes in Computer Science, 2013
Francesco Regazzoni, Christof Paar
exaly  

A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2014
Kan Xiao, Domenic Forte
exaly  

Hardware Trojans: current challenges and approaches

IET Computers and Digital Techniques, 2014
Dominik Merli   +2 more
exaly  

On the Hardware Trojans and Confidentiality

2017
Isa, Eleni, Sklavos, Nicolas
openaire   +1 more source

Home - About - Disclaimer - Privacy