The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Design & Test of Computers
2007, volume: 24, number: 6


  1. Trustworthy ICs for secure embedded computing. [Citation Graph (, )][DBLP]


  2. Guest Editors' Introduction: Security and Trust in Embedded-Systems Design. [Citation Graph (, )][DBLP]


  3. A Survey of Lightweight-Cryptography Implementations. [Citation Graph (, )][DBLP]


  4. OEM Component Authentication. [Citation Graph (, )][DBLP]


  5. Power Analysis Attacks and Countermeasures. [Citation Graph (, )][DBLP]


  6. Faults, Injection Methods, and Fault Attacks. [Citation Graph (, )][DBLP]


  7. Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors. [Citation Graph (, )][DBLP]


  8. Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware. [Citation Graph (, )][DBLP]


  9. Aegis: A Single-Chip Secure Processor. [Citation Graph (, )][DBLP]


  10. Security in SRAM FPGAs. [Citation Graph (, )][DBLP]


  11. Implementing Embedded Security on Dual-Virtual-CPU Systems. [Citation Graph (, )][DBLP]


  12. Protecting Critical Data. [Citation Graph (, )][DBLP]


  13. DASC standards track IP-based design trends. [Citation Graph (, )][DBLP]


  14. Making a List...Checking it Twice. [Citation Graph (, )][DBLP]


  15. DATC Newsletter. [Citation Graph (, )][DBLP]


  16. TTTC Newsletter. [Citation Graph (, )][DBLP]


  17. Tesla and AND gates. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002