共 32 条
[1]
[Anonymous], 2015, P 5 INT WORKSH TRUST, DOI DOI 10.1145/2808414.2808420
[2]
Bansal S., 2011, EETIMES
[3]
Bilzor M, 2011, PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, P288
[4]
Cost-Effective Integration of Three-Dimensional (3D) ICs Emphasizing Testing Cost Analysis
[J].
2010 IEEE AND ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD),
2010,
:471-476
[5]
Dofe J., 2016, 2016 IEEE ASIAN HARD, P1
[6]
Hardware Security Threats and Potential Countermeasures in Emerging 3D ICs
[J].
2016 INTERNATIONAL GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI),
2016,
:69-74
[7]
Gu P, 2016, PR IEEE COMP DESIGN, P520, DOI 10.1109/ICCD.2016.7753336
[8]
Leveraging 3D Technologies for Hardware Security: Opportunities and Challenges
[J].
2016 INTERNATIONAL GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI),
2016,
:347-352
[9]
Hou S., 2016, Interposer technology: Past, now, and future
[10]
Huffmire Ted., 2010, P 5 WORKSHOP EMBEDDE, P1, DOI DOI 10.1145/1873548.1873549