Search dblp for Publications

export results for "toc:db/conf/host/asianhost2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/host/0003RBM16,
  author       = {Poulami Das and
                  Debapriya Basu Roy and
                  Harishma Boyapally and
                  Debdeep Mukhopadhyay},
  title        = {Inner collisions in {ECC:} Vulnerabilities of complete addition formulas
                  for {NIST} curves},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835562},
  doi          = {10.1109/ASIANHOST.2016.7835562},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/0003RBM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/CaoZC16,
  author       = {Yuan Cao and
                  Le Zhang and
                  Chip{-}Hong Chang},
  title        = {Using image sensor {PUF} as root of trust for birthmarking of perceptual
                  image hash},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835573},
  doi          = {10.1109/ASIANHOST.2016.7835573},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/CaoZC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ChenZHJ16,
  author       = {Zhang Chen and
                  Pingqiang Zhou and
                  Tsung{-}Yi Ho and
                  Yier Jin},
  title        = {How secure is split manufacturing in preventing hardware trojan?},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835561},
  doi          = {10.1109/ASIANHOST.2016.7835561},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/ChenZHJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/DelvauxGV16,
  author       = {Jeroen Delvaux and
                  Dawu Gu and
                  Ingrid Verbauwhede},
  title        = {Upper bounds on the min-entropy of {RO} Sum, Arbiter, Feed-Forward
                  Arbiter, and S-ArbRO PUFs},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835572},
  doi          = {10.1109/ASIANHOST.2016.7835572},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/DelvauxGV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/DofeYKSY16,
  author       = {Jaya Dofe and
                  Chen Yan and
                  Scott Kontak and
                  Emre Salman and
                  Qiaoyan Yu},
  title        = {Transistor-level camouflaged logic locking method for monolithic 3D
                  {IC} security},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835570},
  doi          = {10.1109/ASIANHOST.2016.7835570},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/DofeYKSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/GuoTF16,
  author       = {Zimu Guo and
                  Mark M. Tehranipoor and
                  Domenic Forte},
  title        = {Aging attacks for key extraction on permutation-based obfuscation},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835552},
  doi          = {10.1109/ASIANHOST.2016.7835552},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/GuoTF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/HasanKKN16,
  author       = {Syed Rafay Hasan and
                  Charles A. Kamhoua and
                  Kevin A. Kwiat and
                  Laurent Njilla},
  title        = {Translating circuit behavior manifestations of hardware Trojans using
                  model checkers into run-time Trojan detection monitors},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835571},
  doi          = {10.1109/ASIANHOST.2016.7835571},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/HasanKKN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/KanDD16,
  author       = {Senwen Kan and
                  Jennifer Dworak and
                  James George Dunham},
  title        = {Echeloned {IJTAG} data protection},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835558},
  doi          = {10.1109/ASIANHOST.2016.7835558},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/KanDD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/KermaniAX16,
  author       = {Mehran Mozaffari Kermani and
                  Reza Azarderakhsh and
                  Jiafeng Xie},
  title        = {Error detection reliable architectures of Camellia block cipher applicable
                  to different variants of its substitution boxes},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835560},
  doi          = {10.1109/ASIANHOST.2016.7835560},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/KermaniAX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/LermanMV16,
  author       = {Liran Lerman and
                  Olivier Markowitch and
                  Nikita Veshchikov},
  title        = {Comparing Sboxes of ciphers from the perspective of side-channel attacks},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835556},
  doi          = {10.1109/ASIANHOST.2016.7835556},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/LermanMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MajumderURR16,
  author       = {Md. Badruddoja Majumder and
                  Mesbah Uddin and
                  Garrett S. Rose and
                  Jeyavijayan Rajendran},
  title        = {Sneak path enabled authentication for memristive crossbar memories},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835568},
  doi          = {10.1109/ASIANHOST.2016.7835568},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MajumderURR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MatsudaMNHFS16,
  author       = {Kohei Matsuda and
                  Noriyuki Miura and
                  Makoto Nagata and
                  Yu{-}ichi Hayashi and
                  Tatsuya Fujii and
                  Kazuo Sakiyama},
  title        = {On-chip substrate-bounce monitoring for laser-fault countermeasure},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835565},
  doi          = {10.1109/ASIANHOST.2016.7835565},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MatsudaMNHFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MeadBW16,
  author       = {Joshua Mead and
                  Christophe Bobda and
                  Taylor J. L. Whitaker},
  title        = {Defeating drone jamming with hardware sandboxing},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835557},
  doi          = {10.1109/ASIANHOST.2016.7835557},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MeadBW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ParkH16,
  author       = {Aesun Park and
                  Dong{-}Guk Han},
  title        = {Chosen ciphertext Simple Power Analysis on software 8-bit implementation
                  of ring-LWE encryption},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835555},
  doi          = {10.1109/ASIANHOST.2016.7835555},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/ParkH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/RahmanFWT16,
  author       = {Md. Tauhidur Rahman and
                  Domenic Forte and
                  Xiaoxiao Wang and
                  Mark M. Tehranipoor},
  title        = {Enhancing noise sensitivity of embedded SRAMs for robust true random
                  number generation in SoCs},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835559},
  doi          = {10.1109/ASIANHOST.2016.7835559},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/RahmanFWT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/RoyB16,
  author       = {Pushpita Roy and
                  Ansuman Banerjee},
  title        = {A new approach for root-causing attacks on digital microfluidic devices},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835550},
  doi          = {10.1109/ASIANHOST.2016.7835550},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/RoyB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/SaabLT16,
  author       = {Sami Saab and
                  Andrew Leiserson and
                  Michael Tunstall},
  title        = {Key extraction from the primary side of a switched-mode power supply},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835563},
  doi          = {10.1109/ASIANHOST.2016.7835563},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/SaabLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/SakamotoFM16,
  author       = {Junichi Sakamoto and
                  Daisuke Fujimoto and
                  Tsutomu Matsumoto},
  title        = {Laser irradiation on {EEPROM} sense amplifiers enhances side-channel
                  leakage of read bits},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835564},
  doi          = {10.1109/ASIANHOST.2016.7835564},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/SakamotoFM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/SchulzeKKCS16,
  author       = {Travis E. Schulze and
                  Kevin A. Kwiat and
                  Charles A. Kamhoua and
                  Shih{-}Chieh Chang and
                  Yiyu Shi},
  title        = {{RECORD:} Temporarily Randomized Encoding of COmbinational Logic for
                  Resistance to Data Leakage from hardware Trojan},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835566},
  doi          = {10.1109/ASIANHOST.2016.7835566},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/SchulzeKKCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/WangCLQL16,
  author       = {Jiadong Wang and
                  Aijiao Cui and
                  Mengyang Li and
                  Gang Qu and
                  Huawei Li},
  title        = {An ultra-low overhead LUT-based {PUF} for {FPGA}},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835554},
  doi          = {10.1109/ASIANHOST.2016.7835554},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/WangCLQL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/WangWHL16,
  author       = {Sying{-}Jyan Wang and
                  Jhih{-}Yu Wei and
                  Shih{-}Heng Huang and
                  Katherine Shu{-}Min Li},
  title        = {Test generation for combinational hardware Trojans},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835569},
  doi          = {10.1109/ASIANHOST.2016.7835569},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/WangWHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/XueWH16,
  author       = {Mingfu Xue and
                  Jian Wang and
                  Aiqun Hu},
  title        = {An enhanced classification-based golden chips-free hardware Trojan
                  detection technique},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835553},
  doi          = {10.1109/ASIANHOST.2016.7835553},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/XueWH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/YeHL16,
  author       = {Jing Ye and
                  Yu Hu and
                  Xiaowei Li},
  title        = {{RPUF:} Physical Unclonable Function with Randomized Challenge to
                  resist modeling attack},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835567},
  doi          = {10.1109/ASIANHOST.2016.7835567},
  timestamp    = {Mon, 22 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/YeHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ZhengCC16,
  author       = {Yue Zheng and
                  Yuan Cao and
                  Chip{-}Hong Chang},
  title        = {A new event-driven Dynamic Vision Sensor based Physical Unclonable
                  Function for camera authentication in reactive monitoring system},
  booktitle    = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsianHOST.2016.7835551},
  doi          = {10.1109/ASIANHOST.2016.7835551},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/ZhengCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/host/2016a,
  title        = {2016 {IEEE} Asian Hardware-Oriented Security and Trust, AsianHOST
                  2016, Yilan, Taiwan, December 19-20, 2016},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7824659/proceeding},
  isbn         = {978-1-5090-5701-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/2016a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics