Author:
Kutyłowski Mirosław,Cichoń Jacek,Hanzlik Lucjan,Kluczniak Kamil,Chen Xiaofeng,Wang Jianfeng
Publisher
Springer International Publishing
Reference19 articles.
1. Becker, G.T., Regazzoni, F., Paar, C., Burleson, W.P.: Stealthy dopant-level hardware Trojans: extended version. J. Cryptogr. Eng. 4(1), 19–31 (2014)
2. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;P Błaśkiewicz,2011
3. Lecture Notes in Computer Science;P Błaśkiewicz,2011
4. Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: Instantenous revocation of security capabilities. In: USENIX Security Symposium (2001)
5. Lecture Notes in Computer Science;V Goyal,2011