共 29 条
[1]
Al-Anwar A., 2013, EL COMM PHOT C SIECP, P1
[2]
Al-Anwar A., 2013, 16 EUROMICRO C DIG S
[3]
Alam Muhammad Raisul, 2008, 2008 11th International Conference on Computer and Information Technology (ICCIT), P264, DOI 10.1109/ICCITECHN.2008.4803028
[4]
Alkabani Y. M., 2007, 16 USENIX SEC S USEN
[5]
Banga M., 2008, P 18 ACM GREAT LAK S, P363, DOI [DOI 10.1145/1366110.1366196, 10.1145/13661101366196]
[6]
VITAMIN: Voltage Inversion Technique to Ascertain Malicious Insertions in ICs
[J].
2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST,
2009,
:104-107
[7]
A Novel Sustained Vector Technique for the Detection of Hardware Trojans
[J].
22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS,
2009,
:327-332
[8]
Preventing IC Piracy Using Reconfigurable Logic Barriers
[J].
IEEE DESIGN & TEST OF COMPUTERS,
2010, 27 (01)
:66-75
[9]
Beaumont M, 2012, DES AUT TEST EUROPE, P1000
[10]
NEW DIRECTIONS IN CRYPTOGRAPHY
[J].
IEEE TRANSACTIONS ON INFORMATION THEORY,
1976, 22 (06)
:644-654