Réalisées par des traducteurs professionnels, des entreprises, des pages web ou traductions disponibles gratuitement.
dirección: professor of electrical engineering
address: professor of electrical engineering
Dernière mise à jour : 2016-11-30
Fréquence d'utilisation : 1
Qualité :
helsinki university of technology, department of electrical engineering.
helsinki university of technology, department of electrical engineering.
Dernière mise à jour : 2016-03-03
Fréquence d'utilisation : 1
Qualité :
* "scanning the past: a history of electrical engineering from the past".
* "scanning the past: a history of electrical engineering from the past".
Dernière mise à jour : 2016-03-03
Fréquence d'utilisation : 1
Qualité :
Avertissement : un formatage HTML invisible est présent
1–9* rajat subhra chakraborty, somnath paul y swarup bhunia: "on-demand transparency for improving hardware trojan detectability", department of electrical engineering and computer science, case western reserve university, cleveland, oh, usa* yier jin y yiorgos makris: "hardware trojan detection using path delay fingerprint", department of electrical engineering yale university, new haven* reza rad, mohammad tehranipoor y jim plusquellic: "sensitivity analysis to hardware trojans using power supply transient signals", 1st ieee international workshop on hardware-oriented security and trust (host'08), 2008* dakshi agrawal, selcuk baktir, deniz karakoyunlu, pankaj rohatgi y berk sunar: "trojan detection using ic fingerprinting", ibm t.j. watson research center, yorktown heights, electrical \& computer engineering worcester polytechnic institute, worcester, massachusetts, nov 10, 2006* xiaoxiao wang, mohammad tehranipoor y jim plusquellic: "detecting malicious inclusions in secure hardware, challenges and solutions", 1st ieee international workshop on hardware-oriented security and trust (host'08), 2008* miron abramovici y paul bradley: "integrated circuit security - new threats and solutions"* zheng gong y marc x. makkes: "hardware trojan side-channels based on physical unclonable functions" - wistp 2011== referencias ==== enlaces externos ==
1–9* rajat subhra chakraborty, somnath paul and swarup bhunia: on-demand transparency for improving hardware trojan detectability, department of electrical engineering and computer science, case western reserve university, cleveland, oh, usa* yier jin and yiorgos makris: hardware trojan detection using path delay fingerprint, department of electrical engineering yale university, new haven* reza rad, mohammad tehranipoor and jim plusquellic: sensitivity analysis to hardware trojans using power supply transient signals, 1st ieee international workshop on hardware-oriented security and trust (host'08), 2008* dakshi agrawal, selcuk baktir, deniz karakoyunlu, pankaj rohatgi and berk sunar: trojan detection using ic fingerprinting, ibm t.j. watson research center, yorktown heights, electrical \& computer engineering worcester polytechnic institute, worcester, massachusetts, nov 10, 2006* xiaoxiao wang, mohammad tehranipoor and jim plusquellic: detecting malicious inclusions in secure hardware, challenges and solutions, 1st ieee international workshop on hardware-oriented security and trust (host'08), 2008* miron abramovici and paul bradley: integrated circuit security - new threats and solutions* zheng gong and marc x. makkes: hardware trojan side-channels based on physical unclonable functions - information security theory and practice.
Dernière mise à jour : 2016-03-03
Fréquence d'utilisation : 1
Qualité :
Avertissement : un formatage HTML invisible est présent