Behavioral synthesis techniques for intellectual property protection
暂无分享,去创建一个
[1] Miodrag Potkonjak,et al. Fast prototyping of datapath-intensive architectures , 1991, IEEE Design & Test of Computers.
[2] Ahmed H. Tewfik,et al. Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).
[3] Miodrag Potkonjak,et al. Behavioral synthesis techniques for intellectual property protection , 2005, TODE.
[4] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[5] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[6] J.D. Carothers,et al. Placement watermarking of standard-cell designs , 2001, 2001 Southwest Symposium on Mixed-Signal Design (Cat. No.01EX475).
[7] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[8] Boon-Lock Yeo,et al. Watermarking 3D Objects for Verification , 1999, IEEE Computer Graphics and Applications.
[9] Ingemar J. Cox,et al. A secure, imperceptible yet perceptually salient, spread spectrum watermark for multimedia , 1996, Southcon/96 Conference Record.
[10] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[11] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[12] A.V. Oppenheim,et al. Analysis of linear digital networks , 1975, Proceedings of the IEEE.
[13] Catherine A. Schevon,et al. Optimization by simulated annealing: An experimental evaluation , 1984 .
[14] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[15] Miodrag Potkonjak,et al. Intellectual Property Metering , 2001, Information Hiding.
[16] Miodrag Potkonjak,et al. Computational forensic techniques for intellectual property protection , 2001, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[17] Darko Kirovski,et al. Robust spread-spectrum audio watermarking , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[18] Jeffrey J. Rodríguez,et al. Mixed signal design watermarking for IP protection , 2003, Integr. Comput. Aided Eng..
[19] Satoshi Hada,et al. Zero-Knowledge and Code Obfuscation , 2000, ASIACRYPT.
[20] Miodrag Potkonjak,et al. Fingerprinting techniques for field-programmable gate arrayintellectual property protection , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[21] I. Torunoglu,et al. Watermarking-based copyright protection of sequential functions , 2000, IEEE Journal of Solid-State Circuits.
[22] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[23] Minerva M. Yeung,et al. Digital watermarking for high-quality imaging , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.
[24] Ahmed H. Tewfik,et al. Object-based transparent video watermarking , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.
[25] Lawrence O'Gorman,et al. Protecting ownership rights through digital watermarking , 1996 .
[26] Dennis S. Fernandez. Intellectual Property Protection in the EDA Industry , 1994, 31st Design Automation Conference.
[27] J.D. Carothers,et al. Mixed signal design watermarking for IP protection , 2001, 2001 Southwest Symposium on Mixed-Signal Design (Cat. No.01EX475).
[28] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[29] Cecilia R. Aragon,et al. Optimization by Simulated Annealing: An Experimental Evaluation; Part I, Graph Partitioning , 1989, Oper. Res..
[30] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[31] W. R. Daasch,et al. IC identification circuit using device mismatch , 2000, 2000 IEEE International Solid-State Circuits Conference. Digest of Technical Papers (Cat. No.00CH37056).
[32] M. Potkonjak,et al. Protecting ownership rights of a lossless image coder through hierarchical watermarking , 1998, 1998 IEEE Workshop on Signal Processing Systems. SIPS 98. Design and Implementation (Cat. No.98TH8374).
[33] Miodrag Potkonjak,et al. Robust IP watermarking methodologies for physical design , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).
[34] Wenjun Zeng,et al. Perceptual watermarking of still images , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.
[35] Miodrag Potkonjak,et al. Fingerprinting Digital Circuits on Programmable Hardware , 1998, Information Hiding.
[36] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[37] Jeffrey J. Rodriguez,et al. Watermarking ICs for IP protection , 2002 .
[38] Miodrag Potkonjak,et al. Constraint-based watermarking techniques for design IP protection , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[39] Miodrag Potkonjak,et al. Watermarking while preserving the critical path , 2000, Proceedings 37th Design Automation Conference.
[40] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.
[41] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[42] Tariq S. Durrani,et al. IP protection of DSP algorithms for system on chip implementation , 2000, IEEE Trans. Signal Process..
[43] Steven H. Low,et al. Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.
[44] Darko Kirovski,et al. Spread-spectrum audio watermarking: requirements, applications, and limitations , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[45] Stefan Winkler,et al. A vision-based masking model for spread-spectrum image watermarking , 2002, IEEE Trans. Image Process..
[46] Hiroshi Masuda,et al. A shape-preserving data embedding algorithm for NURBS curves and surfaces , 1999, 1999 Proceedings Computer Graphics International.
[47] Giovanni De Micheli,et al. Synthesis and Optimization of Digital Circuits , 1994 .
[48] Miodrag Potkonjak,et al. Local watermarks: methodology and application to behavioral synthesis , 2003, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[49] Edoardo Charbon. Hierarchical watermarking in IC design , 1998, Proceedings of the IEEE 1998 Custom Integrated Circuits Conference (Cat. No.98CH36143).
[50] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[51] Christoph Busch,et al. Towards Blind Detection of Robust Watermarks in Polygonal Models , 2000, Comput. Graph. Forum.
[52] Arlindo L. Oliveira. Techniques for the creation of digital watermarks in sequentialcircuit designs , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[53] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[54] J. Kumagai,et al. Chip detectives [reverse engineering] , 2000 .
[55] Jason Cong,et al. Intellectual property protection by watermarking combinational logic synthesis solutions , 1998, 1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).
[56] M. Potkonjak,et al. Hierarchical watermarking for protection of DSP filter cores , 1999, Proceedings of the IEEE 1999 Custom Integrated Circuits Conference (Cat. No.99CH36327).
[57] L. Litwin,et al. Error control coding , 2001 .
[58] Cecilia R. Aragon,et al. Optimization by Simulated Annealing: An Experimental Evaluation; Part II, Graph Coloring and Number Partitioning , 1991, Oper. Res..
[59] Edoardo Charbon,et al. Watermarking-based copyright protection of sequential functions , 1999 .
[60] Sanjeev Khanna,et al. Watermarking maps: hiding information in structured data , 2000, SODA '00.
[61] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[62] Emil F. Girczyc,et al. Increasing Design Quality and Engineering Productivity through Design Reuse , 1993, 30th ACM/IEEE Design Automation Conference.
[63] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .