Academic literature on the topic 'Hardware Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hardware Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hardware Security"
Polian, Ilia. "Hardware-oriented security." it - Information Technology 61, no. 1 (2019): 1–2. http://dx.doi.org/10.1515/itit-2019-0008.
Full textHunter, Philip. "Hardware-based security." Computer Fraud & Security 2004, no. 2 (2004): 11–12. http://dx.doi.org/10.1016/s1361-3723(04)00029-6.
Full textSengupta, Anirban. "Hardware Security of CE Devices [Hardware Matters]." IEEE Consumer Electronics Magazine 6, no. 1 (2017): 130–33. http://dx.doi.org/10.1109/mce.2016.2614552.
Full textJin, Yier. "Introduction to Hardware Security." Electronics 4, no. 4 (2015): 763–84. http://dx.doi.org/10.3390/electronics4040763.
Full textKoushanfar, Farinaz, and Miodrag Potkonjak. "What is hardware security?" ACM SIGDA Newsletter 40, no. 9 (2010): 1. http://dx.doi.org/10.1145/1866978.1866979.
Full textFox, Dirk. "Hardware Security Module (HSM)." Datenschutz und Datensicherheit - DuD 33, no. 9 (2009): 564. http://dx.doi.org/10.1007/s11623-009-0145-9.
Full textGuin, Ujjwal, Navid Asadizanjani, and Mark Tehranipoor. "Standards for Hardware Security." GetMobile: Mobile Computing and Communications 23, no. 1 (2019): 5–9. http://dx.doi.org/10.1145/3351422.3351424.
Full textQin, Maoyuan, Jiale Li, Jiaqi Yan, Zishuai Hao, Wei Hu, and Baolong Liu. "HT-PGFV: Security-Aware Hardware Trojan Security Property Generation and Formal Security Verification Scheme." Electronics 13, no. 21 (2024): 4286. http://dx.doi.org/10.3390/electronics13214286.
Full textSidhu, Simranjeet, Bassam J. Mohd, and Thaier Hayajneh. "Hardware Security in IoT Devices with Emphasis on Hardware Trojans." Journal of Sensor and Actuator Networks 8, no. 3 (2019): 42. http://dx.doi.org/10.3390/jsan8030042.
Full textAdlkofer, Hans. "Safety and Security Need Hardware." ATZelectronics worldwide 16, no. 10 (2021): 66. http://dx.doi.org/10.1007/s38314-021-0699-3.
Full textDissertations / Theses on the topic "Hardware Security"
Kalibjian, Jeff. "Securing Telemetry Post Processing Applications with Hardware Based Security." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605052.
Full textChakraborty, Rajat Subhra. "Hardware Security through Design Obfuscation." Cleveland, Ohio : Case Western Reserve University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1270133481.
Full textTselekounis, Ioannis. "Cryptographic techniques for hardware security." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/33148.
Full textEdmison, Joshua Nathaniel. "Hardware Architectures for Software Security." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/29244.
Full textLeonhard, Julian. "Analog hardware security and trust." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS246.
Full textBilzor, Michael B. "Defining and enforcing hardware security requirements." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10741.
Full textSekar, Sanjana. "Logic Encryption Methods for Hardware Security." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1505124923353686.
Full textXue, Hao. "Hardware Security and VLSI Design Optimization." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1546466777397815.
Full textValea, Emanuele. "Security Techniques for Test Infrastructures." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS042.
Full textWenhua, Qi, Zhang Qishan, and Liu Hailong. "RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606688.
Full textBooks on the topic "Hardware Security"
Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3.
Full textTehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. Hardware Security Primitives. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-19185-5.
Full textSadeghi, Ahmad-Reza, and David Naccache, eds. Towards Hardware-Intrinsic Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14452-3.
Full textSklavos, Nicolas, Ricardo Chaves, Giorgio Di Natale, and Francesco Regazzoni, eds. Hardware Security and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44318-8.
Full textHalak, Basel, ed. Hardware Supply Chain Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62707-2.
Full textFarahmandi, Farimah, M. Sazadur Rahman, Sree Ranjani Rajendran, and Mark Tehranipoor. CAD for Hardware Security. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26896-0.
Full textTehranipoor, Mark, ed. Emerging Topics in Hardware Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64448-2.
Full textKatkoori, Srinivas, and Sheikh Ariful Islam, eds. Behavioral Synthesis for Hardware Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-78841-4.
Full textMishra, Prabhat, Swarup Bhunia, and Mark Tehranipoor, eds. Hardware IP Security and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49025-0.
Full textTehranipoor, Mark, N. Nalla Anandakumar, and Farimah Farahmandi. Hardware Security Training, Hands-on! Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-31034-8.
Full textBook chapters on the topic "Hardware Security"
Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Secure Physical Design." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_9.
Full textTehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Secure Heterogeneous Integration." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_10.
Full textTehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Digital Twin for Secure Semiconductor Lifecycle Management." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_8.
Full textTehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Quantifiable Assurance in Hardware." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_1.
Full textTehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Materials for Hardware Security." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_11.
Full textTehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Large Language Models for SoC Security." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_6.
Full textTehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Rethinking Hardware Watermark." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_3.
Full textTehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Runtime SoC Security Validation." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_5.
Full textTehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "SoC Security Verification Using Fuzz, Penetration, and AI Testing." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_4.
Full textTehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "Advances in Logic Locking." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_2.
Full textConference papers on the topic "Hardware Security"
Khan, Mansoor, Muhammad Ilyas, and Oguz Bayat. "Enhancing IoT Security Through Hardware Security Modules (HSMs)." In 2024 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS). IEEE, 2024. https://doi.org/10.1109/iccns62192.2024.10776375.
Full textAfsharmazayejani, Raheel, Mohammad Moradi Shahmiri, Parker Link, Hammond Pearce, and Benjamin Tan. "Toward Hardware Security Benchmarking of LLMs." In 2024 IEEE LLM Aided Design Workshop (LAD). IEEE, 2024. http://dx.doi.org/10.1109/lad62341.2024.10691745.
Full textSarma, Nilotpola, E. Bhawani Eswar Reddy, and Chandan Karfa. "Security Concerns of Machine Learning Hardware." In 2024 IEEE 33rd Asian Test Symposium (ATS). IEEE, 2024. https://doi.org/10.1109/ats64447.2024.10915390.
Full textMulcahy, Patrick, Michael Nowatkowski, Jeffrey Morris, and Josefa Guerrero Millan. "Developing a Framework for Hardware Security." In SoutheastCon 2025. IEEE, 2025. https://doi.org/10.1109/southeastcon56624.2025.10971450.
Full textYou, Myoungsung, Jaehyun Nam, Hyunmin Seo, et al. "HardWhale: A Hardware-Isolated Network Security Enforcement System for Cloud Environments." In 2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2024. http://dx.doi.org/10.1109/icdcs60910.2024.00053.
Full textSadeghi, Ahmad-Reza. "Hardware-Assisted Security." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017. http://dx.doi.org/10.1145/3139324.3139326.
Full textLeef, Serge. "Hardware cyber security." In the 2014. ACM Press, 2014. http://dx.doi.org/10.1145/2560519.2565868.
Full textChandra, Vikas, and Rob Aitken. "Mobile hardware security." In 2014 IEEE Hot Chips 26 Symposium (HCS). IEEE, 2014. http://dx.doi.org/10.1109/hotchips.2014.7478796.
Full textLee, Ruby, Simha Sethumadhavan, and G. Edward Suh. "Hardware enhanced security." In the 2012 ACM conference. ACM Press, 2012. http://dx.doi.org/10.1145/2382196.2382323.
Full textBurleson, Wayne, and Yusuf Leblebici. "Hardware security in VLSI." In the 21st edition of the great lakes symposium. ACM Press, 2011. http://dx.doi.org/10.1145/1973009.1973109.
Full textReports on the topic "Hardware Security"
Souppaya, Murugiah. Hardware-Enabled Security:. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8320b.
Full textSouppaya, Murugiah. Hardware-Enabled Security:. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8320.
Full textBartock, Michael. Hardware Enabled Security:. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8320c.ipd.
Full textBartock, Michael. Hardware Enabled Security:. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.ir.8320d.ipd.
Full textBartock, Michael. Hardware Enabled Security:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8320d.
Full textMell, Peter. Hardware Security Failure Scenarios:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8517.ipd.
Full textMell, Peter. Hardware Security Failure Scenarios:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8517.
Full textBartock, Michael, Murugiah Souppaya, Jerry Wheeler, et al. Hardware-Enabled Security: Container Platform Security Prototype. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8320a.
Full textNguyen, Thuy D., Timothy E. Levin, Cynthia E. Irvin, Terry V. Benzel, and Ganesha Bhaskara. Preliminary Security Requirements for SecureCore Hardware. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada457517.
Full textKastner, Ryan, and Ted Huffmire. Threats and Challenges in Reconfigurable Hardware Security. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada511928.
Full text