CORC

浏览/检索结果: 共29条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
An Architectural-Enhanced Secure Design in Embedded System 会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS, 2018-11-23
作者:  Wang, X.;  Xu, B.;  Wang, W.;  Zhang, Z.;  Zhang, X.
收藏  |  浏览/下载:19/0  |  提交时间:2019/12/30
Hardware-Enhanced Protection for the Runtime Data Security in Embedded Systems 期刊论文
ELECTRONICS, 2019, 卷号: 8
作者:  Wang, Weike;  Zhang, Xiaobing;  Hao, Qiang;  Zhang, Zhun;  Xu, Bin
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/30
A PCA and Mahalanobis distance-based detection method for logical hardware Trojan 期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 卷号: 31
作者:  Huang, Jiaoying;  Yang, Daming;  Gao, Cheng;  Fu, Chengcheng
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/30
NEM: A NEW in-VM monitoring with high efficiency and strong isolation 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 10699 LNCS, 页码: 396-405
作者:  Qin, J.;  Shi, B.;  Li, B.
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/30
A novel security validation in embedded system 会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS
作者:  Wang, X.;  Xu, B.;  Wang, W.;  Li, L.;  Du, P.
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/30
Implementation of SM4 on FPGA: Trade-Off Analysis between Area and Speed 会议论文
2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
作者:  Guan, Z.;  Li, Y.;  Shang, T.;  Liu, J.;  Sun, M.
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
Design and sopc-based realization of a video chaotic secure communication scheme 期刊论文
International Journal of Bifurcation and Chaos, 2018, 卷号: 28
作者:  Chen, P.;  Yu, S.;  Chen, B.;  Xiao, L.;  Lu, J.
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/30
Utilizing Hypervisor to Enhance TrustZone's Introspection Capabilities on Non-Secure World [借助Hypervisor 强化TrustZone 对非安全世界的监控能力] 期刊论文
Ruan Jian Xue Bao/Journal of Software, 2018, 卷号: 29, 页码: 2511-2526
作者:  Zhang, Z.-K.;  Li, Z.-J.;  Xia, C.-H.;  Ma, J.-X.;  Cui, J.-H.
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/30
Embedded System Confidentiality Protection by Cryptographic Engine Implemented with Composite Field Arithmetic 会议论文
MATEC Web of Conferences
作者:  Wang, W.;  Wang, X.;  Du, P.;  Tian, Y.;  Zhang, X.
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
An Optimized Method of Hardware Implementation for LHash in the Embedded System 会议论文
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2018), 2018-01-01
作者:  Wang, Xiang;  Tian, Yuntong;  Du, Pei;  Zhang, Xiaobing;  Wang, Weike
收藏  |  浏览/下载:18/0  |  提交时间:2019/12/30


©版权所有 ©2017 CSpace - Powered by CSpace