Author:
Majzoobi Mehrdad,Koushanfar Farinaz,Potkonjak Miodrag
Reference119 articles.
1. Drimer S (2008) Volatile FPGA design security – a survey (v0.96). http://www.cl.cam.ac.uk/~sd410/papers/fpga_security.pdf . Accessed April 2008
2. Chen D, Cong J, Pan P (2006) FPGA design automation: a survey. Found Trends Electron Design Automation 1: 139–169
3. Qu G, Potkonjak M (2003) Intellectual Property Protection in VLSI Design. Springer, Berlin, Heidelberg, New York
4. Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE Design Test Comput 27(1): 10–25
5. Karri R, Rajendran J, Rosenfeld K, Tehranipoor M (2010) Trustworthy hardware: identifying and classifying hardware trojans. IEEE Comput 43(10): 39–46
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献