14 results on '"Hardware obfuscation"'
Search Results
2. Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation
3. VLSI Test and Hardware Security Background for Hardware Obfuscation
4. A Framework for Data Protection of Embedded Systems in IoT Applications
5. Advances in Logic Locking
6. Hardware Obfuscation Methods for Hardware Trojan Prevention and Detection
7. Security Assessment of High-Level Synthesis
8. A Unified Methodology for Hardware Obfuscation and IP Watermarking
9. Obfuscation-Based Secure SoC Design for Protection Against Piracy and Trojan Attacks
10. 3D/2.5D IC-Based Obfuscation
11. Logic Encryption
12. Universally Composable Secure Computation with Corrupted Tokens
13. Permutation-Based Obfuscation
14. Split Manufacturing
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.