Security Enhancements to System on Chip Devices for IoT Perception Layer
暂无分享,去创建一个
K SudeendraKumar | Sauvagya Ranjan Sahoo | Ayas Kanta Swain | Kamala Kanta Mahapatra | Abhishek Mahapatra | Ayass Kant Swain | K. Mahapatra | S. Sahoo | K. SudeendraKumar | Abhishek Mahapatra
[1] Wei Zhao,et al. Design and Realization of WInternet , 2016, ACM Trans. Cyber Phys. Syst..
[2] N. Asokan,et al. On-board credentials with open provisioning , 2009, ASIACCS '09.
[3] Syed Hassan Ahmed,et al. Cyber Physical System: Architecture, applications and research challenges , 2013, 2013 IFIP Wireless Days (WD).
[4] Frederic T. Chong,et al. Sapper: a language for hardware-level security policy enforcement , 2014, ASPLOS.
[5] Yohei Hori,et al. Cryptographie key generation from PUF data using efficient fuzzy extractors , 2014, 16th International Conference on Advanced Communication Technology.
[6] Swarup Bhunia,et al. Security Assurance for System-on-Chip Designs With Untrusted IPs , 2017, IEEE Transactions on Information Forensics and Security.
[7] Srinivas Devadas,et al. Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.
[8] Guobin Xu,et al. A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures , 2016, Big Data Res..
[9] Sandip Ray,et al. The Changing Computing Paradigm With Internet of Things: A Tutorial Introduction , 2016, IEEE Design & Test.
[10] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[11] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[12] Abdelmadjid Bouabdallah,et al. Trusted Execution Environment: What It is, and What It is Not , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[13] Quan Chen,et al. Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World , 2014, CCS.