תוצאות חיפוש - Bhunia, Swarup
- Showing 1 - 6 results of 6
-
1
Security policy in system-on-chip designs specification, implementation and verification מאת Ray, Sandip, Basak, Abhishek, Bhunia, Swarup
יצא לאור 2019סימן המיקום: טוען...Available for University of the Philippines Diliman via SpringerLink. Click here to access
ממוקם: טוען...
Also available remotely for University of the Philippines Diliman via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
2
Low-power variation-tolerant design in nanometer silicon
יצא לאור 2011סימן המיקום: טוען...Available for University of the Philippines Diliman via SpringerLink. Click here to access
ממוקם: טוען...
Electronic Resource -
3
The hardware Trojan war attacks, myths, and defenses
יצא לאור 2018סימן המיקום: טוען...Available for University of the Philippines System via SpringerLink. Click here to access
ממוקם: טוען...
Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
4
Hardware protection through obfuscation
יצא לאור 2017סימן המיקום: טוען...Available for University of the Philippines Diliman via SpringerLink. Click here to access
ממוקם: טוען...
Also available remotely for University of the Philippines Diliman via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
5
Hardware IP security and trust
יצא לאור 2017סימן המיקום: טוען...Available for University of the Philippines Diliman via SpringerLink. Click here to access
ממוקם: טוען...
Also available remotely for University of the Philippines Diliman via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
6
Fundamentals of IP and SoC security design, verification, and debug
יצא לאור 2017סימן המיקום: טוען...Available for University of the Philippines Diliman via SpringerLink. Click here to access
ממוקם: טוען...
Also available remotely for University of the Philippines Diliman via SpringerLink. Click here to access thru EZproxy
Electronic Resource
כלי חיפוש:
נושאים קשורים
Electronic books
Computer security
Data encryption (Computer science)
Electronic circuits
Electronics
Microelectronics
Microprocessors
Security measures
Computer networks
Computer software
Design and construction
Internet
Internet Protocol multimedia subsystem
Low voltage integrated circuits
Reusability


