Results 201 to 210 of about 809,010 (236)
Some of the next articles are maybe not open access.

Hardware security: side-channel attacks and hardware Trojans

2018
In this chapter, we try to highlight the importance of hardware security in modern systems. Increasingly we are connected to loosely controlled networking infrastructures such as IoT and intelligent transportation networks. In such networks, users are connected in an ad hoc style, which makes users'authentication and identity management a very complex ...
openaire   +1 more source

Hardware Trojans in fdSOI

2023 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED), 2023
Christian Lanius   +3 more
openaire   +1 more source

Hardware Trojans Detection and Prevention Techniques Review

Wireless personal communications
R. Naveenkumar, N. M. Sivamangai
semanticscholar   +1 more source

Hardware Trojans

2013
Christian Krieg   +4 more
openaire   +1 more source

A method to prevent hardware Trojans limiting access to layout resources

, 2021
Tareq Muhammad Supon   +3 more
semanticscholar   +1 more source

Runtime Identification of Hardware Trojans by Feature Analysis on Gate-Level Unstructured Data and Anomaly Detection

ACM Transactions on Design Automation of Electronic Systems, 2020
Arunkumar Vijayan   +1 more
exaly  

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence

Journal of Computational Science, 2018
Ali Dehghantanha, Kim-Kwang Raymond Choo
exaly  

Stealthy dopant-level hardware Trojans: extended version

Journal of Cryptographic Engineering, 2014
Francesco Regazzoni, Christof Paar
exaly  

Hardware-Trojaner

Dominik Sisejkovic, Rainer Leupers
openaire   +1 more source

Home - About - Disclaimer - Privacy