-
3
-
-
34548719905
-
Trojan detection using ic fingerprinting
-
May
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar. Trojan detection using ic fingerprinting. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, May 2007.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
5
-
-
2842568131
-
Internal architecture of alpha 21164 microprocessor
-
00:79
-
P. Bannon and J. Keller. Internal architecture of alpha 21164 microprocessor. compcon, 00:79, 1995.
-
(1995)
Compcon
-
-
Bannon, P.1
Keller, J.2
-
7
-
-
0042078549
-
A survey of rollback-recovery protocols in message-passing systems
-
September
-
E. N. Elnozahy, L. Alvisi, Y.-M. Wang, and D. B. Johnson. A Survey of Rollback-Recovery Protocols in Message-Passing Systems. ACM Computing Surveys, 34(3), September 2002.
-
(2002)
ACM Computing Surveys
, vol.34
, Issue.3
-
-
Elnozahy, E.N.1
Alvisi, L.2
Wang, Y.-M.3
Johnson, D.B.4
-
9
-
-
0038341105
-
Silicon physical random functions
-
New York, NY, USA, ACM Press
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Silicon physical random functions. In Proceedings of the 9th ACM conference on Computer and communications security, pages 148–160, New York, NY, USA, 2002. ACM Press.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
van Dijk, M.3
Devadas, S.4
-
10
-
-
62349114557
-
CIA slipped bugs to soviets
-
February
-
D. E. Hoffman. CIA slipped bugs to Soviets. The Washington Post, February 2004. http://www.msnbc.msn.com/id/4394002.
-
(2004)
The Washington Post
-
-
Hoffman, D.E.1
-
11
-
-
33751032041
-
Subvirt: Implementing malware with virtual machines
-
May
-
S. T. King, P. M. Chen, Y.-M. Wang, C. Verbowski, H. J. Wang, and J. R. Lorch. SubVirt: Implementing malware with virtual machines. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, pages 314–327, May 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 314-327
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
12
-
-
84939573910
-
Differential power analysis
-
London, UK, Springer-Verlag
-
P. C. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In CRYPTO’99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, pages 388–397, London, UK, 1999. Springer-Verlag.
-
(1999)
CRYPTO’99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
13
-
-
0034334788
-
Chip detectives
-
J. Kumagai. Chip detectives. IEEE Spectr., 37(11):43–49, 2000.
-
(2000)
IEEE Spectr
, vol.37
, Issue.11
, pp. 43-49
-
-
Kumagai, J.1
-
14
-
-
84976699318
-
The byzantine generals problem
-
L. Lamport, R. E. Shostak, and M. C. Pease. The byzantine generals problem. ACM Trans. Program. Lang. Syst., 4(3):382–401, 1982.
-
(1982)
ACM Trans. Program. Lang. Syst.
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.E.2
Pease, M.C.3
-
17
-
-
17644364039
-
Design and analysis of dual-rail circuits for security applications
-
D. Sokolov, J. Murphy, A. Bystrov, and A. Yakovlev. Design and analysis of dual-rail circuits for security applications. IEEE Trans. Comput., 54(4):449–460, 2005.
-
(2005)
IEEE Trans. Comput.
, vol.54
, Issue.4
, pp. 449-460
-
-
Sokolov, D.1
Murphy, J.2
Bystrov, A.3
Yakovlev, A.4
-
18
-
-
33646906840
-
Design method for constant power consumption of differential logic circuits
-
Washington, DC, USA, IEEE Computer Society
-
K. Tiri and I. Verbauwhede. Design method for constant power consumption of differential logic circuits. In DATE ’05: Proceedings of the conference on Design, Automation and Test in Europe, pages 628–633, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
DATE ’05: Proceedings of the Conference on Design, Automation and Test in Europe
, pp. 628-633
-
-
Tiri, K.1
Verbauwhede, I.2
|