-
1
-
-
84898909471
-
Atmel AVR microcontroller primer: Programming and interfacing
-
New York, NY, USA: Morgan & Claypool
-
S. F. Barrett and D. J. Pack, "Atmel AVR microcontroller primer: Programming and interfacing," in Synthesis Lectures on Digital Circuits and Systems. New York, NY, USA: Morgan & Claypool, 2008.
-
(2008)
Synthesis Lectures on Digital Circuits and Systems.
-
-
Barrett, S.F.1
Pack, D.J.2
-
2
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
DOI 10.1109/SP.2007.36, 4223234, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, "Trojan detection using IC fingerprinting," in Proc. IEEE Symp. Secur. Privacy (SP'07), May 2007, pp. 296-310. (Pubitemid 47432536)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
3
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
C. Gentry, "Computing arbitrary functions of encrypted data," Commun. ACM, vol. 53, no. 3, pp. 97-105, 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
4
-
-
85084095841
-
Designing and implementing malicious hardware
-
Berkeley, CA, USENIX Association
-
S. T. King, J. Tucek, A. Cozzie, C. Grier, W. Jiang, and Y. Zhou, "Designing and implementing malicious hardware," in Proc. 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, Berkeley, CA, 2008, pp. 5:1-5:8, USENIX Association.
-
(2008)
Proc. 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
, pp. 51-58
-
-
King, S.T.1
Tucek, J.2
Cozzie, A.3
Grier, C.4
Jiang, W.5
Zhou, Y.6
-
5
-
-
0034478325
-
Comparative study of two KLA-Tencor advanced patterned wafer inspection systems
-
S. Rowley, S. Thorne, A. Bousetta, C. Perry, and C. Dutton, "Comparative study of two KLA-tencor advanced patterned wafer inspection systems," in Proc. Adv. Semicond. Manufact. Conf. Workshop (IEEE/SEMI), 2000, pp. 141. (Pubitemid 32137825)
-
(2000)
IEEE International Symposium on Semiconductor Manufacturing Conference, Proceedings
, pp. 141
-
-
Rowley Steven1
Thorne Sean2
Bousetta Ali3
Perry Cathy4
Dutton Cathy5
-
6
-
-
76949093207
-
A survey of hardware Trojan taxonomy and detection
-
Jan.-Feb.
-
M. Tehranipoor and F. Koushanfar, "A survey of hardware Trojan taxonomy and detection," IEEE Design Test Comput., vol. 27, no. 1, pp. 10-25, Jan.-Feb. 2010.
-
(2010)
IEEE Design Test Comput.
, vol.27
, Issue.1
, pp. 10-25
-
-
Tehranipoor, M.1
Koushanfar, F.2
-
7
-
-
0003133883
-
Probabilistic logics and the synthesis of reliable organisms from unreliable components
-
J. von Neumann, "Probabilistic logics and the synthesis of reliable organisms from unreliable components," in Proc. Automata Studies, 1956, pp. 43-99.
-
(1956)
Proc. Automata Studies
, pp. 43-99
-
-
Von Neumann, J.1
-
8
-
-
80051995886
-
Silencing hardware backdoors
-
Wash., DC, IEEE Computer Society
-
A. Waksman and S. Sethumadhavan, "Silencing hardware backdoors," in Proc. 2011 IEEE Symp. Secur. Privacy (SP'11), Wash., DC, 2011, pp. 49-63, IEEE Computer Society.
-
(2011)
Proc. 2011 IEEE Symp. Secur. Privacy (SP'11)
, pp. 49-63
-
-
Waksman, A.1
Sethumadhavan, S.2
|