Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Watermarking techniques for intellectual property protection
DAC '98 Proceedings of the 35th annual Design Automation Conference
A case study of partially evaluated hardware circuits: Key-specific DES
FPL '97 Proceedings of the 7th International Workshop on Field-Programmable Logic and Applications
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Robust FPGA intellectual property protection through multiple small watermarks
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
Robust techniques for watermarking sequential circuit designs
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
Internet Authentication of LUT-Based FPGA Configuration Files
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
A Novel Watermarking Technique for LUT Based FPGA Designs
FPL '02 Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications
Zero overhead watermarking technique for FPGA designs
Proceedings of the 13th ACM Great Lakes symposium on VLSI
Secure IP downloading for SRAM FPGAs
Microprocessors & Microsystems
Power Signature Watermarking of IP Cores for FPGAs
Journal of Signal Processing Systems
A method for hardware metering
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
Protecting bus-based hardware IP by secret sharing
Proceedings of the 45th annual Design Automation Conference
A SVD-based fragile watermarking scheme for image authentication
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
An FPGA intellectual property authentication scheme through watermarking techniques
IMCAS'06 Proceedings of the 5th WSEAS international conference on Instrumentation, measurement, circuits and systems
Information hiding in finite state machine
IH'04 Proceedings of the 6th international conference on Information Hiding
Secure public verification of IP marks in FPGA design through a zero-knowledge protocol
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
RFID based access control protection scheme for SRAM FPGA IP cores
Microprocessors & Microsystems
Hi-index | 0.00 |