共 50 条
- [23] Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (21):
- [24] Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications Concurrency and Computation: Practice and Experience, 2022, 34 (21):
- [25] Hardware Trust through Layout Filling: a Hardware Trojan Prevention Technique 2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2016, : 254 - 259
- [28] MICROCOMPUTERS MICROPROCESSORS - HARDWARE, SOFTWARE, AND APPLICATIONS - HILBURN,JL, JULICH,PM IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1978, 8 (11): : 834 - 834
- [30] Separating trojan horses, viruses, and worms - A proposed taxonomy of software weapons IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 127 - 134