Results 201 to 210 of about 809,010 (236)
Some of the next articles are maybe not open access.
Hardware security: side-channel attacks and hardware Trojans
2018In this chapter, we try to highlight the importance of hardware security in modern systems. Increasingly we are connected to loosely controlled networking infrastructures such as IoT and intelligent transportation networks. In such networks, users are connected in an ad hoc style, which makes users'authentication and identity management a very complex ...
openaire +1 more source
2023 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED), 2023
Christian Lanius +3 more
openaire +1 more source
Christian Lanius +3 more
openaire +1 more source
Hardware Trojans Detection and Prevention Techniques Review
Wireless personal communicationsR. Naveenkumar, N. M. Sivamangai
semanticscholar +1 more source
A method to prevent hardware Trojans limiting access to layout resources
, 2021Tareq Muhammad Supon +3 more
semanticscholar +1 more source
A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence
Journal of Computational Science, 2018Ali Dehghantanha, Kim-Kwang Raymond Choo
exaly
Stealthy dopant-level hardware Trojans: extended version
Journal of Cryptographic Engineering, 2014Francesco Regazzoni, Christof Paar
exaly

