共 5 条
- [1] Becker G.(2014)Stealthy dopant-level hardware Trojans: extended version J Cryptogr Eng 4 19-31
- [2] Regazzoni F.(2008)Contra Online-Durchsuchung Informatik Spektrum 31 65-69
- [3] Paar C.h.(undefined)undefined undefined undefined undefined-undefined
- [4] Burleson W.(undefined)undefined undefined undefined undefined-undefined
- [5] Pfitzmann A.(undefined)undefined undefined undefined undefined-undefined