Author:
Rajendran Sreeja,Syed Azhar,Lourde R. Mary
Reference15 articles.
1. Syed A, Mary Lourde R (2016) Hardware security threats to DSP applications in an IoT network. In: 2016 IEEE international symposium on nanoelectronic and information systems (iNIS). IEEE, pp 62–66
2. Babar S, Stango A, Prasad N, Sen J, Prasad R (2011) Proposed embedded security framework for internet of things (IoT). In: IEEE international conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (Wireless VITAE), pp 1–5
3. Chakraborty RS, Narasimhan S, Bhunia S (2010) Hardware Trojan: threats and emerging solutions.
http://www.trust-hub.org/resources/113
4. Chakraborty RS, Bhunia S (2009) Security against hardware Trojan through a novel application of design obfuscation. In: Proceedings of the 2009 international conference on computer-aided design, pp 113–116
5. Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008) Hardware Trojan detection and isolation using current integration and localized current analysis
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献