Enhancing Security of FPGA-Based Embedded Systems with Combinational Logic Binding
Published 2017 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Enhancing Security of FPGA-Based Embedded Systems with Combinational Logic Binding
Authors
Keywords
cloning attack, reverse engineering, FPGA (field-programmable gate array) security, hardware security
Journal
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY
Volume 32, Issue 2, Pages 329-339
Publisher
Springer Nature
Online
2017-03-09
DOI
10.1007/s11390-017-1700-8
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Effective and Efficient Global Context Verification for Image Copy Detection
- (2017) Zhili Zhou et al. IEEE Transactions on Information Forensics and Security
- Efficient algorithm for k-barrier coverage based on integer linear programming
- (2016) Yanhua Zhang et al. China Communications
- Fingerprint liveness detection based on multi-scale LPQ and PCA
- (2016) Chengsheng Yuan et al. China Communications
- Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
- (2016) Zhangjie Fu et al. IEEE Transactions on Information Forensics and Security
- A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
- (2016) Zhihua Xia et al. IEEE Transactions on Information Forensics and Security
- Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
- (2016) Zhangjie Fu et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
- (2016) Zhihua Xia et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function
- (2016) Ji-Liang Zhang et al. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY
- Segmentation-Based Image Copy-Move Forgery Detection Scheme
- (2015) Jian Li et al. IEEE Transactions on Information Forensics and Security
- Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing
- (2015) Zhangjie FU et al. IEICE TRANSACTIONS ON COMMUNICATIONS
- Social Network and Tag Sources Based Augmenting Collaborative Recommender System
- (2015) Tinghuai MA et al. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
- Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing
- (2015) Zhangjie FU et al. IEICE TRANSACTIONS ON COMMUNICATIONS
- Social Network and Tag Sources Based Augmenting Collaborative Recommender System
- (2015) Tinghuai MA et al. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
- A Survey on Silicon PUFs and Recent Advances in Ring Oscillator PUFs
- (2014) Ji-Liang Zhang et al. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY
- Trusted Integrated Circuits: The Problem and Challenges
- (2014) Yong-Qiang Lv et al. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY
- Steganalysis of LSB matching using differences between nonadjacent pixels
- (2014) Zhihua Xia et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Physical Unclonable Functions and Applications: A Tutorial
- (2014) Charles Herder et al. PROCEEDINGS OF THE IEEE
- Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks
- (2014) Shengdong Xie et al. WIRELESS PERSONAL COMMUNICATIONS
- Scaling Reverse Time Migration Performance through Reconfigurable Dataflow Engines
- (2013) Haohuan Fu et al. IEEE MICRO
- Steganalysis of least significant bit matching using multi-order differences
- (2013) Zhihua Xia et al. Security and Communication Networks
- A Flexible Design Flow for Software IP Binding in FPGA
- (2010) Michael A. Gora et al. IEEE Transactions on Industrial Informatics
- Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
- (2008) D.E. Holcomb et al. IEEE TRANSACTIONS ON COMPUTERS
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started