ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
Latest Publications
TOTAL DOCUMENTS
31
(FIVE YEARS 0)
H-INDEX
11
(FIVE YEARS 0)
Published By IEEE
9781457710599
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
TinyTPM: A lightweight module aimed to IP protection and trusted embedded platforms
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
◽
10.1109/hst.2011.5954987
◽
2011
◽
Cited By ~ 7
Author(s):
Thomas Feller
◽
Sunil Malipatlolla
◽
David Meister
◽
Sorin A. Huss
Keyword(s):
Ip Protection
◽
Embedded Platforms
Download Full-text
Placement of trust anchors in embedded computer systems
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
◽
10.1109/hst.2011.5955006
◽
2011
◽
Cited By ~ 5
Author(s):
Stephen Papa
◽
William Casper
◽
Suku Nair
Keyword(s):
Computer Systems
◽
Embedded Computer
Download Full-text
Performance evaluation of protocols resilient to physical attacks
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
◽
10.1109/hst.2011.5954995
◽
2011
◽
Author(s):
Sylvain Guilley
◽
Laurent Sauvage
◽
Jean-Luc Danger
◽
Nidhal Selmane
◽
Denis Real
Keyword(s):
Performance Evaluation
Download Full-text
A survey of frequently identified vulnerabilities in commercial computing semiconductors
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
◽
10.1109/hst.2011.5955008
◽
2011
◽
Cited By ~ 2
Author(s):
Kevin Gotze
Download Full-text
Security Checkers: Detecting processor malicious inclusions at runtime
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
◽
10.1109/hst.2011.5954992
◽
2011
◽
Cited By ~ 15
Author(s):
Michael Bilzor
◽
Ted Huffmire
◽
Cynthia Irvine
◽
Tim Levin
Download Full-text
Case study: Detecting hardware Trojans in third-party digital IP cores
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
◽
10.1109/hst.2011.5954998
◽
2011
◽
Cited By ~ 106
Author(s):
Xuehui Zhang
◽
Mohammad Tehranipoor
Keyword(s):
Third Party
◽
Hardware Trojans
◽
Ip Cores
Download Full-text
Hardware intrinsic security based on SRAM PUFs: Tales from the industry
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
◽
10.1109/hst.2011.5955009
◽
2011
◽
Cited By ~ 2
Author(s):
Helena Handschuh
Download Full-text
A novel fault attack against ECDSA
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
◽
10.1109/hst.2011.5955015
◽
2011
◽
Cited By ~ 11
Author(s):
Alessandro Barenghi
◽
Guido Bertoni
◽
Andrea Palomba
◽
Ruggero Susella
Keyword(s):
Fault Attack
Download Full-text
Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
◽
10.1109/hst.2011.5954996
◽
2011
◽
Cited By ~ 7
Author(s):
Sumio Morioka
◽
Toshiyuki Isshiki
◽
Satoshi Obana
◽
Yuichi Nakamura
◽
Kazue Sako
Keyword(s):
Group Signature
◽
Flexible Architecture
◽
Architecture Optimization
Download Full-text
On improving reliability of delay based Physically Unclonable Functions under temperature variations
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
◽
10.1109/hst.2011.5955012
◽
2011
◽
Cited By ~ 14
Author(s):
Raghavan Kumar
◽
Harikrishnan Kumarapillai Chandrikakutty
◽
Sandip Kundu
Keyword(s):
Temperature Variations
◽
Physically Unclonable Functions
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close