|
Journals in DBLP
Trustworthy ICs for secure embedded computing. [Citation Graph (, )][DBLP]
Guest Editors' Introduction: Security and Trust in Embedded-Systems Design. [Citation Graph (, )][DBLP]
A Survey of Lightweight-Cryptography Implementations. [Citation Graph (, )][DBLP]
OEM Component Authentication. [Citation Graph (, )][DBLP]
Power Analysis Attacks and Countermeasures. [Citation Graph (, )][DBLP]
Faults, Injection Methods, and Fault Attacks. [Citation Graph (, )][DBLP]
Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors. [Citation Graph (, )][DBLP]
Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware. [Citation Graph (, )][DBLP]
Aegis: A Single-Chip Secure Processor. [Citation Graph (, )][DBLP]
Security in SRAM FPGAs. [Citation Graph (, )][DBLP]
Implementing Embedded Security on Dual-Virtual-CPU Systems. [Citation Graph (, )][DBLP]
Protecting Critical Data. [Citation Graph (, )][DBLP]
DASC standards track IP-based design trends. [Citation Graph (, )][DBLP]
Making a List...Checking it Twice. [Citation Graph (, )][DBLP]
DATC Newsletter. [Citation Graph (, )][DBLP]
TTTC Newsletter. [Citation Graph (, )][DBLP]
Tesla and AND gates. [Citation Graph (, )][DBLP]
|