Graph Similarity and its Applications to Hardware Security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability

Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the off-shore companies. In this paper, we proposed a new placement algorithm that hinders the hardwa...

متن کامل

petrology and geochemistry of khar-bash (western shahrood) and its relation ship to iron mineralization

منطقه مورد مطالعه در 23 کیلومتری جنوب غرب شهرستاشاهرود قرار دارد که در نقشه 100000/1 شاهرود قرار گرفته است.ناحیه مورد مطالعه در تقسیمات ساختاری ایران بخشی از زون البرز شرقی است . در طی سنوزوئیک این زون به شدت تحت تأثیر فازهای کوهزایی آلپی قرار گرفته و فعالیت های آتشفشانی انوسن در قسمت های غربی آن دیده می شود . از نظر ترکیب سنگ شناسی منطقه مورد مطالعه متنوع و بیشتر شامل سنگ های رسوبی مانند : آ...

15 صفحه اول

Template Based Semantic Similarity for Security Applications

Today’s search technology delivers impressive results in finding relevant documents for given keywords. However many applications in various fields including genetics, pharmacy, social networks etc. as well as national security need more than what traditional search can provide. Users need to query a very large knowledge base (KB) using semantic similarity, to discover its relevant subsets. One...

متن کامل

Introduction to Hardware Security

Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently j...

متن کامل

construction and validation of translation metacognitive strategy questionnaire and its application to translation quality

like any other learning activity, translation is a problem solving activity which involves executing parallel cognitive processes. the ability to think about these higher processes, plan, organize, monitor and evaluate the most influential executive cognitive processes is what flavell (1975) called “metacognition” which encompasses raising awareness of mental processes as well as using effectiv...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Computers

سال: 2020

ISSN: 0018-9340,1557-9956,2326-3814

DOI: 10.1109/tc.2019.2953752