AI-Based Hardware Security Methods for Internet-of-Things Applications
- 6 September 2022
- book chapter
- other
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 97 references indexed in Scilit:
- Hardware Trojan Detection for Gate-level ICs Using Signal Correlation Based ClusteringPublished by EDAA ,2015
- Security, privacy and trust in Internet of Things: The road aheadComputer Networks, 2015
- Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power MapsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2014
- A Primer on Hardware Security: Models, Methods, and MetricsProceedings of the IEEE, 2014
- On the features and challenges of security and privacy in distributed internet of thingsComputer Networks, 2013
- A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processorsLecture Notes in Computer Science, 2012
- Differential Fault Analysis of the Advanced Encryption Standard Using a Single FaultLecture Notes in Computer Science, 2011
- The EM Side—Channel(s)Lecture Notes in Computer Science, 2003
- Differential Power AnalysisLecture Notes in Computer Science, 1999
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsLecture Notes in Computer Science, 1996