Works matching DE "HARDWARE Trojans (Computers)"


Results: 53
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13

    Distributed Shadow for Router Security Defense.

    Published in:
    International Journal of Software Engineering & Knowledge Engineering, 2018, v. 28, n. 2, p. 193, doi. 10.1142/S021819401840003X
    By:
    • Yufeng Li;
    • Le Tian;
    • Han Qiu;
    • Chuanhao Zhang
    Publication type:
    Article
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26

    Editorial.

    Published in:
    Journal of Electronic Testing, 2024, v. 40, n. 6, p. 689, doi. 10.1007/s10836-024-06156-0
    By:
    • Agrawal, Vishwani D.
    Publication type:
    Article
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37

    Cryptanalysis of WG Family of Stream Ciphers.

    Published in:
    Computer Journal, 2015, v. 58, n. 10, p. 2677, doi. 10.1093/comjnl/bxv024
    By:
    • LIN DING;
    • CHENHUI JIN;
    • JIE GUAN;
    • SHAOWU ZHANG;
    • TING CUI;
    • DONG HAN;
    • WEI ZHAO
    Publication type:
    Article
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50