Author:
Gong Zheng,Makkes Marc X.
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 296–310. IEEE Computer Society, Los Alamitos (2007)
2. Lecture Notes in Computer Science;A.A. Bogdanov,2007
3. Chakraborty, R.S., Wolff, F.G., Paul, S., Papachristou, C.A., Bhunia, S.: Mero: A statistical approach for hardware trojan detection. In: Clavier and Gaj [4], pp. 396–410
4. Lecture Notes in Computer Science,2009
5. Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., Khandelwal, V.: Design and implementation of PUF-based unclonableRFID ICs for anti-counterfeiting and security applications. In: IEEE International Conference on RFID, pp. 58–64 (2008)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献