Surviving Information Leakage Hardware Trojan Attacks Using...

  • Main
  • 2017
  • Surviving Information Leakage Hardware Trojan Attacks Using...

Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation

Hu, Nianhang, Ye, Mengmei, Wei, Sheng
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Year:
2017
Language:
english
Journal:
IEEE Transactions on Emerging Topics in Computing
DOI:
10.1109/TETC.2017.2648739
File:
PDF, 740 KB
english, 2017
Conversion to is in progress
Conversion to is failed