Author:
Jung Edward,Bossuet Lilian
Publisher
Springer International Publishing
Reference23 articles.
1. M. Tehranipoor, C. Wang (eds.), Introduction to Hardware Security and Trust (Springer Science+Business Media, LLC, 2012), Chaps. 6 and 17
2. L. Bossuet, D. Hely, Salware: salutary hardware to design trusted IC, in Proceedings of the Trustworthy Manufacturing and Utilization of Secure Devices Workshop (TRUDEVICE ’13), Avignon, France (2013), pp. 30–31. http://hal-ujm.ccsd.cnrs.fr/ujm-00833871
3. G. Wolfe, J.L. Wong, M. Potkonjak, Watermarking graph partitioning solutions. IEEE Trans. Comp.-Aided Des. Integ. Cir. Sys. 21, 1196–1204 (2002). doi: 10.1109/TCAD.2002.802277
4. J.L. Wong, G. Qu, M. Potkonjak, Optimization-intensive watermarking techniques for decision problems. IEEE Trans. Comp.-Aided Des. Integ. Cir. Syst. 23(1), 119–127 (2006). doi: 10.1109/TCAD.2003.819900
5. G. Qu, M. Potkonjak, Analysis of watermarking techniques for graph coloring problem, in Proceedings of the IEEE/ACM international conference on Computer-aided design (ICCAD ‘98) (ACM, New York, NY, USA, 1998), pp. 190–193. doi: 10.1145/288548.288607
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献