The SCEAS System
Navigation Menu

Conferences in DBLP

(host)
2008 (conf/host/2008)


  1. TRUST in Integrated Circuits and 3rd Party IP. [Citation Graph (, )][DBLP]


  2. Sensitivity Analysis to Hardware Trojans using Power Supply Transient Signals. [Citation Graph (, )][DBLP]


  3. At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection. [Citation Graph (, )][DBLP]


  4. Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions. [Citation Graph (, )][DBLP]


  5. Slicing Up a Perfect Hardware Masking Scheme. [Citation Graph (, )][DBLP]


  6. Place-and-Route Impact on the Security of DPL Designs in FPGAs. [Citation Graph (, )][DBLP]


  7. A High-Performance, Low-Overhead, Power-Analysis-Resistant, Single-Rail Logic Style. [Citation Graph (, )][DBLP]


  8. The Role of Platform Integrity in Trustworthy Systems. [Citation Graph (, )][DBLP]


  9. A Region Based Approach for the Identification of Hardware Trojans. [Citation Graph (, )][DBLP]


  10. On-Demand Transparency for Improving Hardware Trojan Detectability. [Citation Graph (, )][DBLP]


  11. Hardware Trojan Detection Using Path Delay Fingerprint. [Citation Graph (, )][DBLP]


  12. Verifying the Authenticity of Chip Designs with the DesignTag System. [Citation Graph (, )][DBLP]


  13. Circuit CAD Tools as a Security Threat. [Citation Graph (, )][DBLP]


  14. The Butterfly PUF: Protecting IP on every FPGA. [Citation Graph (, )][DBLP]


  15. Unified Digit-Serial Multiplier and Inverter in Finite Field GF(2m). [Citation Graph (, )][DBLP]


  16. IC Activation and User Authentication for Security-Sensitive Systems. [Citation Graph (, )][DBLP]


  17. Designer's Hardware Trojan Horse. [Citation Graph (, )][DBLP]


  18. Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems. [Citation Graph (, )][DBLP]


  19. Trustworthy System Security through 3-D Integrated Hardware. [Citation Graph (, )][DBLP]


  20. A Hardware-Assisted Data Hiding Based Approach in Building High-Performance Trusted Computing Systems. [Citation Graph (, )][DBLP]


  21. An Embedded Flash Memory Vault for Software Trojan Protection. [Citation Graph (, )][DBLP]


  22. A Solution for On-Line TRUST Validation. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002