咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 9 篇 计算机科学与技术...
    • 7 篇 电子科学与技术(可...
    • 6 篇 软件工程
    • 5 篇 电气工程
    • 5 篇 控制科学与工程
    • 5 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 信息与通信工程
  • 8 篇 理学
    • 7 篇 数学
    • 1 篇 物理学
    • 1 篇 生物学
  • 1 篇 农学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 12 篇 hardware securit...
  • 2 篇 reverse engineer...
  • 2 篇 fpga
  • 1 篇 circuit camoufla...
  • 1 篇 cryptographic ch...
  • 1 篇 trusted ic
  • 1 篇 intellectual pro...
  • 1 篇 neuromorphic com...
  • 1 篇 intellectual pro...
  • 1 篇 iot
  • 1 篇 nist
  • 1 篇 ip protection
  • 1 篇 fpga (field-prog...
  • 1 篇 node importance
  • 1 篇 fpga circuits
  • 1 篇 vlsi
  • 1 篇 fabrication vari...
  • 1 篇 aiot
  • 1 篇 memristor
  • 1 篇 logic encryption

机构

  • 2 篇 school of comput...
  • 2 篇 department of co...
  • 1 篇 college of infor...
  • 1 篇 the department o...
  • 1 篇 department of el...
  • 1 篇 department of co...
  • 1 篇 college of compu...
  • 1 篇 department of ap...
  • 1 篇 ieee
  • 1 篇 cyberspace secur...
  • 1 篇 school of comput...
  • 1 篇 college of infor...
  • 1 篇 college of infor...
  • 1 篇 hubei key labora...
  • 1 篇 software college...
  • 1 篇 department of el...
  • 1 篇 tsinghua nationa...
  • 1 篇 department of co...
  • 1 篇 institute of mic...
  • 1 篇 hubei yangtze me...

作者

  • 2 篇 周强
  • 2 篇 xing-wei wang
  • 2 篇 zhi-hua xia
  • 2 篇 qiang zhou
  • 2 篇 ji-liang zhang
  • 2 篇 屈钢
  • 2 篇 吕勇强
  • 1 篇 xing-ming sun
  • 1 篇 ruixue wang
  • 1 篇 ibrahima gueye
  • 1 篇 xingxing gong
  • 1 篇 wenbin zuo
  • 1 篇 fayez alqahtani
  • 1 篇 pierre-louis cay...
  • 1 篇 xingwei wang
  • 1 篇 xiangshui miao
  • 1 篇 idy diop
  • 1 篇 yong ding
  • 1 篇 senjie zhang
  • 1 篇 yuanjing zhang

语言

  • 12 篇 英文
检索条件"主题词=hardware security"
12 条 记 录,以下是1-10 订阅
排序:
A Multi-Flow Information Flow Tracking Approach for Proving Quantitative hardware security Properties
收藏 引用
Tsinghua Science and Technology 2021年 第1期26卷 62-71页
作者: Yu Tai Wei Hu Lu Zhang Dejun Mu Ryan Kastner the School of Cybersecurity Northwestern Polytechnical UniversityXi'an 710072China the School of Automation Northwestern Polytechnical UniversityXi'an 710072China the Department of Computer Science and Engineering University of CaliforniaSan DiegoCA 92093USA
Information Flow Tracking(IFT)is an established formal method for proving security properties related to confidentiality,integrity,and *** has seen promise in identifying security vulnerabilities resulting from design... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
hardware security for IoT in the Quantum Era: Survey and Challenges
收藏 引用
Journal of Information security 2023年 第4期14卷 227-249页
作者: Doudou Dione Boly Seck Idy Diop Pierre-Louis Cayrel Demba Faye Ibrahima Gueye IT Engineering Department Cheikh Anta Diop University Dakar Senegal
The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Identification of Important FPGA Modules Based on Complex Network
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 1027-1047页
作者: Senjie Zhang Jinbo Wang Shan Zhou Jingpei Wang Zhenyong Zhang Ruixue Wang School of Aeronautics and Astronautics University of Chinese Academy of SciencesBeijing101408China Technology and Engineering Center for Space Utilization Chinese Academy of SciencesBeijing100094China College of Control Science and Engineering Zhejiang UniversityHangzhou310063China College of Computer Science and Technology Guizhou UniversityGuiyang550025China
The globalization of hardware designs and supply chains,as well as the integration of third-party intellectual property(IP)cores,has led to an increased focus from malicious attackers on computing ***,existing defense... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Spear and Shield: Evolution of Integrated Circuit Camouflaging
收藏 引用
Journal of Computer Science & Technology 2018年 第1期33卷 42-57页
作者: Xue-Yan Wang Qiang Zhou Yi-Ci Cai Gang Qu Department of Computer Science and Technology Tsinghua University Beijing 100083 China Department of Electrical and Computer Engineering UniversiLy of Maryland College Park MD 20740 U.S.A.
Intellectual property (IP) protection is one of the hardcore problems in hardware security. Semiconductor industry still lacks effective and proactive defense to shield IPs from reverse engineering (RE) based atta... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Machine Learning Aided Key-Guessing Attack Paradigm Against Logic Block Encryption
收藏 引用
Journal of Computer Science & Technology 2021年 第5期36卷 1102-1117页
作者: Yi Zhong Jian-Hua Feng Xiao-Xin Cui Xiao-Le Cui Institute of Microelectronics Peking UniversityBeijing 100871China Key Laboratory of Integrated Microsystems Peking University Shenzhen Graduate SchoolShenzhen 518055China
hardware security remains as a major concern in the circuit design *** block based encryption has been widely adopted as a simple but effective protection *** this paper,the potential threat arising from the rapidly d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function
收藏 引用
Journal of Computer Science & Technology 2016年 第1期31卷 124-136页
作者: Ji-Liang Zhang Qiang Wu Yi-Peng Ding Yong-Qiang Lv Qiang Zhou Zhi-Hua Xia Xing-Ming Sun Xing-Wei Wang Software College Northeastern University Shenyang 110819 China College of Information Science and Engineering Hunan University Changsha 410082 China School of Physics and Electronics Central South University Changsha 410083 China Research Institute of Information Technology Tsinghua University Beijing 100084 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
Physical unclonable function (PUF) makes use of the uncontrollable process variations during the production of IC to generate a unique signature for each IC. It has a wide application in security such as FPGA intell... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Enhancing security of FPGA-Based Embedded Systems with Combinational Logic Binding
收藏 引用
Journal of Computer Science & Technology 2017年 第2期32卷 329-339页
作者: Ji-Liang Zhang Wei-Zheng Wang Xing-Wei Wang Zhi-Hua Xia Software College Northeastern University Shenyang 110169 China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing 210096 China Department of Computer and Communication Engineering Changsha University of Science and Technology Changsha 410014 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
With the increasing use of field-programmable gate arrays (FPGAs) in embedded systems and many embedded applications, the failure to protect FPGA-based embedded systems from cloning attacks has brought serious losse... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Trusted Integrated Circuits: The Problem and Challenges
收藏 引用
Journal of Computer Science & Technology 2014年 第5期29卷 918-928页
作者: 吕勇强 周强 蔡懿慈 屈钢 Tsinghua National Laboratory for Information Science and Technology Research Institute of Information Technology Tsinghua University Department of Computer Science and Technology Tsinghua University Department of Electrical and Computer Engineering University of Maryland College Park MD 20742 U.S.A. Senior MemberIEEE
hardware security has become more and more important in current information security architecture. Recently collected reports have shown that there may have been considerable hardware attacks prepared for possible mil... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Survey on Silicon PUFs and Recent Advances in Ring Oscillator PUFs
收藏 引用
Journal of Computer Science & Technology 2014年 第4期29卷 664-678页
作者: 张吉良 屈钢 吕勇强 周强 CCF ACM IEEE Department of Electrical and Computer Engineering University of Maryland College Park MD 20742 U.S.A. College of Information Science and Engineering Hunan University Department of Computer Science and Technology Tsinghua University Research Institute of Information Technology Tsinghua University
Silicon physical unclonable function (PUF) is a popular hardware security primitive that exploits the intrinsic variation of IC manufacturing process to generate chip-unique information for various security related ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A PUF-Based and Cloud-Assisted Lightweight Authentication for Multi-Hop Body Area Network
收藏 引用
Tsinghua Science and Technology 2021年 第1期26卷 36-47页
作者: Wang Xiao Tan Jiliang Zhang Yuanjing Zhang Zheng Qin Yong Ding Xingwei Wang the College of Computer Science and Electronic Engineering Hunan UniversityChangsha 410082China Cyberspace security Research Center Peng Cheng LaboratoryShenzhen 518000China Guangxi Key Laboratory of Cryptography and Information security Guilin University of Electronic TechnologyGuilin 541004China the College of Computer Science and Engineering Northeastern UniversityShenyang 110004China
Wireless sensor technology plays an important role in the military,medical,and commercial fields *** Body Area Network(WBAN)is a special application of the wireless sensor network in human health monitoring,through wh... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论