Verification Methods For Secure and Reliable SoPC Systems

被引:1
|
作者
Kong, Lu [1 ]
Wang, JinBo [1 ]
机构
[1] Chinese Acad Sci, Technol & Engn Ctr Space Utilizat, Beijing, Peoples R China
关键词
D O I
10.1109/QRS-C.2017.116
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:616 / 617
页数:2
相关论文
共 50 条
  • [41] Achieving Reliable and Secure Communications in Wireless-Powered NOMA Systems
    Cao, Kunrui
    Wang, Buhong
    Ding, Haiyang
    Lv, Lu
    Tian, Jiwei
    Hu, Hang
    Gong, Fengkui
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (02) : 1978 - 1983
  • [42] Energy storage systems make DG more reliable, efficient, secure
    不详
    POWER, 2002, 146 (07) : 62 - +
  • [43] Special Issue on Design of Reliable, Secure and Intelligent Systems for Healthcare Applications
    Singh, Pradeep Kumar
    Kumar, Rajiv
    Sharma, Ashutosh
    INTERNATIONAL JOURNAL OF HEALTHCARE INFORMATION SYSTEMS AND INFORMATICS, 2021, 16 (02) : VI - VIII
  • [44] Building reliable secure computing systems out of unreliable insecure components
    Dobson, J
    Randell, B
    17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, 2001-January : 162 - 173
  • [45] Reliable entanglement verification
    Arrazola, Juan Miguel
    Gittsovich, Oleg
    Donohue, John Matthew
    Lavoie, Jonathan
    Resch, Kevin J.
    Luetkenhaus, Norbert
    PHYSICAL REVIEW A, 2013, 87 (06):
  • [46] Secure Track Verification
    Schaefer, Matthias
    Lenders, Vincent
    Schmitt, Jens
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 199 - 213
  • [47] Secure Path Verification
    Cabodi, G.
    Camurati, P.
    Finocchiaro, S. F.
    Loiacono, C.
    Savarese, F.
    Vendraminetto, D.
    2016 1ST IEEE INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2016, : 58 - 63
  • [48] Secure iris verification
    Yang, Shenglin
    Verbauwhede, Ingrid
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 133 - +
  • [49] Formal methods and automated verification of critical systems
    ter Beek, Maurice H.
    Gnesi, Stefania
    Knapp, Alexander
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2018, 20 (04) : 355 - 358
  • [50] Computational methods for the verification of adaptive control systems
    Prasanth, R
    Boskovic, J
    Mehra, R
    SIGNAL PROCESSING, SENSOR FUSION, AND TARGET RECOGNITION XIII, 2004, 5429 : 264 - 272