712 results on '"Tehranipoor, Mark"'
Search Results
52. Logic-Locking Insertion and Assessment
53. CAD for Reverse Engineering
54. CAD for Securing IPs Based on Logic Locking
55. CAD for Anti-probing
56. CAD for Anti-counterfeiting
57. CAD for Electromagnetic Fault Injection
58. CAD for Fault Injection Detection
59. CAD for Hardware/Software Security Verification
60. CAD for Hardware Trojan Detection
61. CAD for Power Side-Channel Detection
62. CAD for Information Leakage Assessment
63. CAD for Security Asset Identification
64. Metrics for SoC Security Verification
65. Introduction to CAD for Hardware Security
66. CAD for FPGA Security
67. The Future of CAD for Hardware Security
68. CAD for High-Level Synthesis
69. CAD for Machine Learning in Hardware Security
70. Hybrid Extrinsic Radio Frequency PUF
71. True Random Number Generators
72. Extrinsic Direct Characterization PUF
73. Hardware Security Primitives Based on Emerging Technologies
74. Optical PUF
75. Direct Intrinsic Characterization PUF
76. Intrinsic Racetrack PUF
77. Intrinsic-Transient PUF
78. Volatile Memory-Based PUF
79. Tamper Detection
80. Virtual Proof of Reality
81. Package-Level Counterfeit Detection and Avoidance
82. Counterfeit and Recycled IC Detection
83. Lightweight Cryptography
84. Embedded Watermarks
85. Side-Channel Protection in Cryptographic Hardware
86. Fault Injection Resistant Cryptographic Hardware
87. Hardware Camouflaging in Integrated Circuits
88. Analog Security
89. RanStop: A Hardware-assisted Runtime Crypto-Ransomware Detection Technique
90. Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives
91. Hardware Security Primitives
92. CAD for Hardware Security
93. Defense-in-Depth: A Recipe for Logic Locking to Prevail
94. EOP: An Encryption-Obfuscation Solution for Protecting PCBs Against Tampering and Reverse Engineering
95. RTL-PSC: Automated Power Side-Channel Leakage Assessment at Register-Transfer Level
96. True Random Number Generators
97. Fault Injection Resistant Cryptographic Hardware
98. Side-Channel Protection in Cryptographic Hardware
99. Extrinsic Direct Characterization PUF
100. Hybrid Extrinsic Radio Frequency PUF
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.