Enhancing Security of FPGA-Based Embedded Systems with Combinational Logic Binding
暂无分享,去创建一个
Zhihua Xia | Jiliang Zhang | Xingwei Wang | Weizheng Wang | Zhibin Xia | Xingwei Wang | Ji-Liang Zhang | Wei-Zheng Wang
[1] Zhihua Xia,et al. Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.
[2] Xingming Sun,et al. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.
[3] Miodrag Potkonjak,et al. Fingerprinting techniques for field-programmable gate arrayintellectual property protection , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[4] Guangwen Yang,et al. Scaling Reverse Time Migration Performance through Reconfigurable Dataflow Engines , 2014, IEEE Micro.
[5] Mikhail J. Atallah,et al. Binding software to specific native hardware in a VM environment: the puf challenge and opportunity , 2008, VMSec '08.
[6] Hao Wang,et al. A measure system of zero moment point using wearable inertial sensors , 2016, China Communications.
[7] Jin Wang,et al. Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .
[8] Yuxiang Wang,et al. Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks , 2014, Wirel. Pers. Commun..
[9] Hori Yohei,et al. Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems , 2008, 2008 International Conference on Field Programmable Logic and Applications.
[10] Naixue Xiong,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.
[11] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[12] Qiang Zhou,et al. Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function , 2016, Journal of Computer Science and Technology.
[13] Jason Moore,et al. Authenticated encryption for FPGA bitstreams , 2011, FPGA '11.
[14] Qiang Zhou,et al. A Survey on Silicon PUFs and Recent Advances in Ring Oscillator PUFs , 2014, Journal of Computer Science and Technology.
[15] Tinghuai Ma,et al. Social Network and Tag Sources Based Augmenting Collaborative Recommender System , 2015, IEICE Trans. Inf. Syst..
[16] Srinivas Devadas,et al. Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.
[17] Yici Cai,et al. Trusted Integrated Circuits: The Problem and Challenges , 2014, Journal of Computer Science and Technology.
[18] Gang Qu,et al. Reconfigurable Binding against FPGA Replay Attacks , 2015, TODE.
[19] Miodrag Potkonjak,et al. Techniques for Design and Implementation of Secure Reconfigurable PUFs , 2009, TRETS.
[20] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[21] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[22] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[23] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[24] Gang Qu,et al. A highly flexible ring oscillator PUF , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[25] Gang Qu,et al. A survey on security and trust of FPGA-based systems , 2014, 2014 International Conference on Field-Programmable Technology (FPT).
[26] Jarrod A. Roy,et al. EPIC: Ending Piracy of Integrated Circuits , 2008, 2008 Design, Automation and Test in Europe.
[27] Miodrag Potkonjak,et al. Intellectual Property Protection in VLSI Designs: Theory and Practice , 2003 .
[28] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[29] Xingming Sun,et al. Efficient algorithm for k-barrier coverage based on integer linear programming , 2016, China Communications.
[30] Jason Helge Anderson,et al. A PUF design for secure FPGA-based embedded systems , 2010, 2010 15th Asia and South Pacific Design Automation Conference (ASP-DAC).
[31] Tom Kean,et al. Cryptographic rights management of FPGA intellectual property cores , 2002, FPGA '02.
[32] Xingming Sun,et al. Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.
[33] Srinivas Devadas,et al. PUF Modeling Attacks on Simulated and Silicon Data , 2013, IEEE Transactions on Information Forensics and Security.
[34] Jian Shen,et al. A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .
[35] Georg Sigl,et al. Side-Channel Analysis of PUFs and Fuzzy Extractors , 2011, TRUST.
[36] Chi-En Daniel Yin,et al. Design and implementation of a group-based RO PUF , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[37] Chengsheng Yuan,et al. Fingerprint liveness detection based on multi-scale LPQ and PCA , 2016, China Communications.
[38] Jean-Baptiste Note,et al. From the bitstream to the netlist , 2008, FPGA '08.
[39] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[40] Daniel E. Holcomb,et al. Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.
[41] Farinaz Koushanfar,et al. Integrated circuits metering for piracy protection and digital rights management: an overview , 2011, GLSVLSI '11.
[42] Kenji Toda,et al. Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems , 2008, IWSEC.
[43] Patrick Schaumont,et al. A Flexible Design Flow for Software IP Binding in FPGA , 2010, IEEE Transactions on Industrial Informatics.
[44] Jin Wang,et al. A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks , 2014 .
[45] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.