Cited By
View all- Saito M(2012)IEICE Communications Society Magazine10.1587/bplus.5.3285:4(328-333)Online publication date: 2012
- Deng DChan ASuh G(2010)Authentication of Processor Hardware Leveraging Performance Limits in Detailed Simulations and EmulationsTowards Hardware-Intrinsic Security10.1007/978-3-642-14452-3_14(309-329)Online publication date: 12-Oct-2010
- Deng DChan ASuh G(2009)Hardware authentication leveraging performance limits in detailed simulations and emulationsProceedings of the 46th Annual Design Automation Conference10.1145/1629911.1630090(682-687)Online publication date: 26-Jul-2009
- Show More Cited By