Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/host/host2014.bht:"
@inproceedings{DBLP:conf/host/AliSSK14, author = {Sk Subidh Ali and Ozgur Sinanoglu and Samah Mohamed Saeed and Ramesh Karri}, title = {New scan attacks against state-of-the-art countermeasures and {DFT}}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {142--147}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855585}, doi = {10.1109/HST.2014.6855585}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/AliSSK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/BhasinGDN14, author = {Shivam Bhasin and Tarik Graba and Jean{-}Luc Danger and Zakaria Najm}, title = {A look into {SIMON} from a side-channel perspective}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {56--59}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855568}, doi = {10.1109/HST.2014.6855568}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BhasinGDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/CioranescoDGGMNN14, author = {Jean{-}Michel Cioranesco and Jean{-}Luc Danger and Tarik Graba and Sylvain Guilley and Yves Mathieu and David Naccache and Xuan Thuy Ngo}, title = {Cryptographically secure shields}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {25--31}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855563}, doi = {10.1109/HST.2014.6855563}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/CioranescoDGGMNN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/CourbonLFT14, author = {Franck Courbon and Philippe Loubet{-}Moundi and Jacques J. A. Fournier and Assia Tria}, title = {Increasing the efficiency of laser fault injections using fast gate level reverse engineering}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {60--63}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855569}, doi = {10.1109/HST.2014.6855569}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/CourbonLFT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/DhanuskodiVK14, author = {Siva Nishok Dhanuskodi and Arunkumar Vijayakumar and Sandip Kundu}, title = {A Chaotic Ring oscillator based Random Number Generator}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {160--165}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855588}, doi = {10.1109/HST.2014.6855588}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/DhanuskodiVK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/FujimotoTMNHHBD14, author = {Daisuke Fujimoto and Daichi Tanaka and Noriyuki Miura and Makoto Nagata and Yu{-}ichi Hayashi and Naofumi Homma and Shivam Bhasin and Jean{-}Luc Danger}, title = {Side-channel leakage on silicon substrate of {CMOS} cryptographic chip}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {32--37}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855564}, doi = {10.1109/HST.2014.6855564}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/FujimotoTMNHHBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/GominaRGCT14, author = {Kamil Gomina and Jean{-}Baptiste Rigaud and Philippe Gendrier and Philippe Candelier and Assia Tria}, title = {Power supply glitch attacks: Design and evaluation of detection circuits}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {136--141}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855584}, doi = {10.1109/HST.2014.6855584}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/GominaRGCT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/GuoMJK14, author = {Xiaofei Guo and Debdeep Mukhopadhyay and Chenglu Jin and Ramesh Karri}, title = {{NREPO:} Normal basis Recomputing with Permuted Operands}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {118--123}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855581}, doi = {10.1109/HST.2014.6855581}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/GuoMJK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/IsmariP14, author = {Dylan Ismari and Jim Plusquellic}, title = {IP-level implementation of a resistance-based physical unclonable function}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {64--69}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855570}, doi = {10.1109/HST.2014.6855570}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/IsmariP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/IyengarRG14, author = {Anirudh Iyengar and Kenneth Ramclam and Swaroop Ghosh}, title = {{DWM-PUF:} {A} low-overhead, memory-based security primitive}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {154--159}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855587}, doi = {10.1109/HST.2014.6855587}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/IyengarRG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/JagasivamaniGSBF14, author = {Meenatchi Jagasivamani and Peter Gadfort and Michel Sika and Michael Bajura and Michael Fritze}, title = {Split-fabrication obfuscation: Metrics and techniques}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {7--12}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855560}, doi = {10.1109/HST.2014.6855560}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/JagasivamaniGSBF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/Koeberl0RW14, author = {Patrick Koeberl and Jiangtao Li and Anand Rajan and Wei Wu}, title = {Entropy loss in PUF-based key generation schemes: The repetition code pitfall}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {44--49}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855566}, doi = {10.1109/HST.2014.6855566}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/Koeberl0RW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/KrsticYPOT14, author = {Sava Krstic and Jin Yang and David W. Palmer and Randy B. Osborne and Eran Talmor}, title = {Security of SoC firmware load protocols}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {70--75}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855571}, doi = {10.1109/HST.2014.6855571}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/KrsticYPOT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/KumarB14, author = {Raghavan Kumar and Wayne P. Burleson}, title = {On design of a highly secure {PUF} based on non-linear current mirrors}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {38--43}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855565}, doi = {10.1109/HST.2014.6855565}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/KumarB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/MaesL14, author = {Roel Maes and Vincent van der Leest}, title = {Countering the effects of silicon aging on {SRAM} PUFs}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {148--153}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855586}, doi = {10.1109/HST.2014.6855586}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/MaesL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/MoroHDRE14, author = {Nicolas Moro and Karine Heydemann and Amine Dehbaoui and Bruno Robisson and Emmanuelle Encrenaz}, title = {Experimental evaluation of two software countermeasures against fault attacks}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {112--117}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855580}, doi = {10.1109/HST.2014.6855580}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/MoroHDRE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/OkamotoHAM14, author = {Kotaro Okamoto and Naofumi Homma and Takafumi Aoki and Sumio Morioka}, title = {A hierarchical formal approach to verifying side-channel resistant cryptographic processors}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {76--79}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855572}, doi = {10.1109/HST.2014.6855572}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/OkamotoHAM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/PicekEPBJ14, author = {Stjepan Picek and Baris Ege and Kostas Papagiannopoulos and Lejla Batina and Domagoj Jakobovic}, title = {Optimality and beyond: The case of 4{\texttimes}4 S-boxes}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {80--83}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855573}, doi = {10.1109/HST.2014.6855573}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/PicekEPBJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/SahooSMCK14, author = {Durga Prasad Sahoo and Sayandeep Saha and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty and Hitesh Kapoor}, title = {Composite {PUF:} {A} new design paradigm for Physically Unclonable Functions on {FPGA}}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {50--55}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855567}, doi = {10.1109/HST.2014.6855567}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/SahooSMCK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/SollKMH14, author = {Oliver Soll and Thomas Korak and Michael Muehlberghuber and Michael Hutter}, title = {EM-based detection of hardware trojans on FPGAs}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {84--87}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855574}, doi = {10.1109/HST.2014.6855574}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/SollKMH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/SpainFIC14, author = {Merrielle Spain and Benjamin Fuller and Kyle Ingols and Robert K. Cunningham}, title = {Robust keys from physical unclonable functions}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {88--92}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855575}, doi = {10.1109/HST.2014.6855575}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/SpainFIC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/StellariSWCHP14, author = {Franco Stellari and Peilin Song and Alan J. Weger and Jim Culp and A. Herbert and Dirk Pfeiffer}, title = {Verification of untrusted chips using trusted layout and emission measurements}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {19--24}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855562}, doi = {10.1109/HST.2014.6855562}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/StellariSWCHP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/TahaS14, author = {Mostafa M. I. Taha and Patrick Schaumont}, title = {Side-channel countermeasure for {SHA-3} at almost-zero area overhead}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {93--96}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855576}, doi = {10.1109/HST.2014.6855576}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/TahaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/TiranOTAM14, author = {S{\'{e}}bastien Tiran and S{\'{e}}bastien Ordas and Yannick Teglia and Michel Agoyan and Philippe Maurine}, title = {A frequency leakage model for {SCA}}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {97--100}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855577}, doi = {10.1109/HST.2014.6855577}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/TiranOTAM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/VaidyanathanDSLP14, author = {Kaushik Vaidyanathan and Bishnu Prasad Das and Huseyin Ekin Sumbul and Renzhi Liu and Larry T. Pileggi}, title = {Building trusted ICs using split fabrication}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855559}, doi = {10.1109/HST.2014.6855559}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/VaidyanathanDSLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/VaidyanathanLSZFP14, author = {Kaushik Vaidyanathan and Renzhi Liu and Huseyin Ekin Sumbul and Qiuling Zhu and Franz Franchetti and Larry T. Pileggi}, title = {Efficient and secure intellectual property {(IP)} design with split fabrication}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {13--18}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855561}, doi = {10.1109/HST.2014.6855561}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/VaidyanathanLSZFP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/XiaoRF0ST14, author = {Kan Xiao and Md. Tauhidur Rahman and Domenic Forte and Yu Huang and Mei Su and Mohammad Tehranipoor}, title = {Bit selection algorithm suitable for high-volume production of {SRAM-PUF}}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {101--106}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855578}, doi = {10.1109/HST.2014.6855578}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/XiaoRF0ST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/Yoshimizu14, author = {Norimasa Yoshimizu}, title = {Hardware trojan detection by symmetry breaking in path delays}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {107--111}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855579}, doi = {10.1109/HST.2014.6855579}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/Yoshimizu14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/YuMVD14, author = {Meng{-}Day (Mandel) Yu and David M'Ra{\"{\i}}hi and Ingrid Verbauwhede and Srinivas Devadas}, title = {A noise bifurcation architecture for linear additive physical functions}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {124--129}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855582}, doi = {10.1109/HST.2014.6855582}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/YuMVD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/ZussaDCR14, author = {Lo{\"{\i}}c Zussa and Jean{-}Max Dutertre and Jessy Cl{\'{e}}di{\`{e}}re and Bruno Robisson}, title = {Analysis of the fault injection mechanism related to negative and positive power supply glitches using an on-chip voltmeter}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {130--135}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855583}, doi = {10.1109/HST.2014.6855583}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/ZussaDCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/host/2014, title = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6847848/proceeding}, isbn = {978-1-4799-4114-8}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.