Showing 1 - 3 results of 3 for search 'Tehranipoor, Mark' Skip to content
UPFind
  • Book Bag: 0 items (Full)
  • Language
    • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Nederlands
    • Português
    • Português (Brasil)
    • 中文(简体)
    • 中文(繁體)
    • Türkçe
    • עברית
    • Gaeilge
    • Cymraeg
    • Ελληνικά
    • Català
    • Euskara
    • Русский
    • Čeština
    • Suomi
    • Svenska
    • polski
    • Dansk
    • slovenščina
    • اللغة العربية
    • বাংলা
    • Galego
    • Tiếng Việt
    • Hrvatski
    • हिंदी
Advanced
  • Author
  • Tehranipoor, Mark
Showing 1 - 3 results of 3 for search 'Tehranipoor, Mark', query time: 0.01s Refine Results
  1. 1

    The hardware Trojan war attacks, myths, and defenses

    Published 2018
    Call Number: loading...
    Located: loading...
    Available for University of the Philippines System via SpringerLink. Click here to access
    Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy
    Electronic Resource
    Preview
    Preview
    Preview
    Add to Book Bag Remove from Book Bag
    The hardware Trojan war attacks, myths, and defenses
  2. 2

    Hardware protection through obfuscation

    Published 2017
    Call Number: loading...
    Located: loading...
    Available for University of the Philippines Diliman via SpringerLink. Click here to access
    Also available remotely for University of the Philippines Diliman via SpringerLink. Click here to access thru EZproxy
    Electronic Resource
    Preview
    Preview
    Preview
    Add to Book Bag Remove from Book Bag
    Hardware protection through obfuscation
  3. 3

    Hardware IP security and trust

    Published 2017
    Call Number: loading...
    Located: loading...
    Available for University of the Philippines Diliman via SpringerLink. Click here to access
    Also available remotely for University of the Philippines Diliman via SpringerLink. Click here to access thru EZproxy
    Electronic Resource
    Preview
    Preview
    Preview
    Add to Book Bag Remove from Book Bag
    Hardware IP security and trust

Search Tools:

  • Email Search

Related Subjects

Electronic books Computer security Data encryption (Computer science) Computer networks Computer software Electronic circuits Electronics Internet Protocol multimedia subsystem Microelectronics Microprocessors Reusability Security measures

Search Options

  • Search History
  • Advanced Search

Discover More

  • Browse the Catalog
  • Explore Channels

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs

More Information

  • About Tuklas
  • Contact Us

TUKLAS: UP Libraries' Resource Discovery Tool
Copyright © 2020-2021. The University Library, University of the Philippines Diliman