Keyword: ⛔ no doi found

2019 (1)
RACE: Sub-Linear Memory Sketches for Approximate Near-Neighbor Search on Streaming Data. Coleman, B., Shrivastava, A., & Baraniuk, R. G. arXiv:1902.06687 [cs, eess, stat], February, 2019. arXiv: 1902.06687
RACE: Sub-Linear Memory Sketches for Approximate Near-Neighbor Search on Streaming Data [link]Paper  abstract   bibtex   
2018 (5)
Toward Scalable Verification for Safety-Critical Deep Networks. Kuper, L., Katz, G., Gottschlich, J. E., Julian, K., Barrett, C., & Kochenderfer, M. J. 2018.
Toward Scalable Verification for Safety-Critical Deep Networks [link]Paper  abstract   bibtex   
Rhinosinusites aiguës de l'enfant. Simon, F. Pédiatrie Pratique, 295:2–3, 2018.
bibtex   
Learning-Aided Physical Layer Authentication as an Intelligent Process. Fang, H., Wang, X., & Hanzo, L. arXiv:1808.02456 [cs], August, 2018. arXiv: 1808.02456
Learning-Aided Physical Layer Authentication as an Intelligent Process [link]Paper  abstract   bibtex   
Sanctorum: A lightweight security monitor for secure enclaves. Lebedev, I., Hogan, K., Drean, J., Kohlbrenner, D., Lee, D., Asanović, K., Song, D., & Devadas, S. arXiv:1812.10605 [cs], December, 2018. arXiv: 1812.10605
Sanctorum: A lightweight security monitor for secure enclaves [link]Paper  abstract   bibtex   
Gazelle: A Low Latency Framework for Secure Neural Network Inference. Juvekar, C., Vaikuntanathan, V., & Chandrakasan, A. arXiv:1801.05507 [cs], January, 2018. arXiv: 1801.05507
Gazelle: A Low Latency Framework for Secure Neural Network Inference [link]Paper  abstract   bibtex   
2017 (12)
Malformation veineuse de la tête et du cou, Intérêt du laser diode. Sauvaget, E., Simon, F., Salvan, D., Faucon, B., Borsik, M., Le Clerc, N., & Bisdorff, A. Sang Thrombose Vaisseaux, 29(2):69–74, 2017.
bibtex   
Robust Physical-World Attacks on Deep Learning Models. Evtimov, I., Eykholt, K., Fernandes, E., Kohno, T., Li, B., Prakash, A., Rahmati, A., & Song, D. arXiv:1707.08945 [cs], July, 2017. arXiv: 1707.08945
Robust Physical-World Attacks on Deep Learning Models [link]Paper  abstract   bibtex   
Une stratégie moins agressive pour le traitement des chondrosarcomes des fosses nasales et de la base du crâne. Simon, F., Feuvret, L., Bresson, D., Calugaru, V., Guichard, J., El Zein, S., Froelich, S., Vérillaud, B., & Herman, P. Cancer/Radiothérapie, 21(6):679, 2017.
bibtex   
Feature Alignment for the Analysis of Verbatim Text Transcripts. Jentner, W., El-Assady, M., Gipp, B., & Keim, D. In Proceedings of the Eurographics Conference on Visualization (EuroVis), 2017.
bibtex   
Zugang zu und Nachnutzung von wissenschaftlicher Software. Science, A. O. March, 2017.
Zugang zu und Nachnutzung von wissenschaftlicher Software. [link]Paper  bibtex   
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes. Ferrag, M. A., Maglaras, L., Argyriou, A., Kosmanos, D., & Janicke, H. arXiv:1708.04027 [cs], August, 2017. arXiv: 1708.04027
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes [link]Paper  abstract   bibtex   
Image Acquisition System Using On Sensor Compressed Sampling Technique. Gupta, P. S. & Choi, G. S. arXiv:1709.07041 [eess], September, 2017. arXiv: 1709.07041
Image Acquisition System Using On Sensor Compressed Sampling Technique [link]Paper  abstract   bibtex   
Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong. He, W., Wei, J., Chen, X., Carlini, N., & Song, D. arXiv:1706.04701 [cs], June, 2017. arXiv: 1706.04701
Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong [link]Paper  abstract   bibtex   
Arrays of (locality-sensitive) Count Estimators (ACE): High-Speed Anomaly Detection via Cache Lookups. Luo, C. & Shrivastava, A. arXiv:1706.06664 [cs, stat], June, 2017. arXiv: 1706.06664
Arrays of (locality-sensitive) Count Estimators (ACE): High-Speed Anomaly Detection via Cache Lookups [link]Paper  abstract   bibtex   
FLASH: Randomized Algorithms Accelerated over CPU-GPU for Ultra-High Dimensional Similarity Search. Wang, Y., Shrivastava, A., & Ryu, J. arXiv:1709.01190 [cs], September, 2017. arXiv: 1709.01190
FLASH: Randomized Algorithms Accelerated over CPU-GPU for Ultra-High Dimensional Similarity Search [link]Paper  abstract   bibtex   
What Are Optimal Coding Functions for Time-of-Flight Imaging?. GUPTA, M., VELTEN, A., NAYAR, S. K., & BREITBACH, E. 2017.
bibtex   
High Efficiency Power Side-Channel Attack Immunity using Noise Injection in Attenuated Signature Domain. Das, D., Maity, S., Nasir, S. B., Ghosh, S., Raychowdhury, A., & Sen, S. arXiv:1703.10328 [cs], March, 2017. arXiv: 1703.10328
High Efficiency Power Side-Channel Attack Immunity using Noise Injection in Attenuated Signature Domain [link]Paper  abstract   bibtex   
2016 (10)
Towards the Science of Security and Privacy in Machine Learning. Papernot, N., McDaniel, P. D., Sinha, A., & Wellman, M. P. CoRR, 2016.
Towards the Science of Security and Privacy in Machine Learning [link]Paper  bibtex   
Sanctum: Minimal Hardware Extensions for Strong Software Isolation. Costan, V., Lebedev, I., & Devadas, S. In 25th \USENIX\ Security Symposium (\USENIX\ Security 16), pages 857–874, 2016.
Sanctum: Minimal Hardware Extensions for Strong Software Isolation [link]Paper  bibtex   
Malformation veineuse de la langue entraînant un syndrome d’apnée du sommeil sévère. Simon, F., Le Clerc, N., Bisdorff, A., & Herman, P. La Lettre de l'ORL, 2016.
bibtex   
From Scenarios over Models to Management — Alien Spread Management. Krug, R. M, Roura-Pascual, N., & Richardson, D. M In 2016. 00000
bibtex   
Integrating Scenarios and Models into Ecosystem Management: an example from the Maloti-Drakensberg Park World Heritage Site, South Africa. Rushworth, I. & Krug, R. M In 2016. 00000
bibtex   
Handling Privacy and Security in the Internet of Things. Britton, K. 2016.
bibtex   
Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems. Shin, H., Son, Y., Park, Y., Kwon, Y., & Kim, Y. In 2016.
Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems [link]Paper  bibtex   
On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets. Eltayeb, M. E., Choi, J., Al-Naffouri, T. Y., & Heath Jr, R. W. arXiv:1609.04499 [cs, math], September, 2016. arXiv: 1609.04499
On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets [link]Paper  abstract   bibtex   
SC-DCNN: Highly-Scalable Deep Convolutional Neural Network using Stochastic Computing. Ren, A., Li, J., Li, Z., Ding, C., Qian, X., Qiu, Q., Yuan, B., & Wang, Y. arXiv:1611.05939 [cs], November, 2016. arXiv: 1611.05939
SC-DCNN: Highly-Scalable Deep Convolutional Neural Network using Stochastic Computing [link]Paper  abstract   bibtex   
Recommendation for the Entropy Sources Used for Random Bit Generation. Turan, M. S., Barker, E., Kelsey, J., McKay, K. A., Baish, M. L., & Boyle, M. NIST Special Publication 800-90B, 2016.
Recommendation for the Entropy Sources Used for Random Bit Generation [pdf]Paper  bibtex   
2015 (3)
A SysML formal framework to combine discrete and continuous simulation for testing. Gauthier, J., Bouquet, F., Hammad, A., & Peureux, F. In International Conference on Formal Engineering Methods, pages 134–152, 2015. Springer.
bibtex   
Formal methods for semi-autonomous driving. Seshia, S. A., Sadigh, D., & Sastry, S. S. In Proceedings of the 52nd Annual Design Automation Conference, of DAC '15, pages 1–5, New York, NY, USA, June, 2015. Association for Computing Machinery. tex.ids= seshiaFormalMethodsSemiautonomous2015a, seshiaFormalMethodsSemiautonomous2015b, seshiaFormalMethodsSemiautonomous2015c place: New York, NY, USA
Formal methods for semi-autonomous driving [link]Paper  doi  abstract   bibtex   
FPGA Based Accelerator for Pattern Matching in YARA Framework. Singapura, S. G., Yang, Y. E., Panangadan, A., Nemeth, T., & Prasanna, V. K. 2015.
bibtex   
2014 (12)
弯管中段塞流的数值模拟. 杨帆 & 周晓 辽宁石油化工大学期刊社, 34(5):23–27, 2014.
bibtex   
Model-based synthesis of control software from system-level formal specifications. Mari, F., Melatti, I., Salvo, I., & Tronci, E. ACM Transactions on Software Engineering and Methodology, 23(1):6:1–6:42, February, 2014. tex.ids= mari_model_2013
Model-based synthesis of control software from system-level formal specifications [link]Paper  doi  abstract   bibtex   
TUW-IMP at the NTCIR-11 Math-2. Lipani, A., Andersson, L., Piroi, F., Lupu, M., & Hanbury, A. In Kando, N., Joho, H., & Kishida, K., editors, Proceedings of the 11th NTCIR Conference on Evaluation of Information Access Technologies, NTCIR-11, National Center of Sciences, Tokyo, Japan, December 9-12, 2014, 2014. National Institute of Informatics (NII).
TUW-IMP at the NTCIR-11 Math-2 [pdf]Paper  bibtex   
Towards Formal Modelling and Verification of Pervasive Computing Systems. Liu, Y., Zhang, X., Liu, Y., Dong, J. S., Sun, J., Biswas, J., & Mokhtari, M. In Trans. Computational Collective Intelligence, volume 16, pages 62–91, 2014.
bibtex   
Distributed Representations of Sentences and Documents. Le, Q. V. & Mikolov, T. In Proceedings of the 31th International Conference on Machine Learning, ICML 2014, Beijing, China, 21-26 June 2014, volume 32, of JMLR Workshop and Conference Proceedings, pages 1188–1196, 2014. JMLR.org.
Distributed Representations of Sentences and Documents [link]Paper  bibtex   
An Institutional Framework for Heterogeneous Formal Development in UML. Knapp, A., Mossakowski, T., & Roggenbach, M. arXiv:1403.7747 [cs], March, 2014.
An Institutional Framework for Heterogeneous Formal Development in UML [link]Paper  abstract   bibtex   
Sequence to Sequence Learning with Neural Networks. Sutskever, I., Vinyals, O., & Le, Q. V. In Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N. D., & Weinberger, K. Q., editors, Annual Conference on Neural Information Processing Systems, pages 3104–3112, Montreal, Quebec, Canada, 2014.
Sequence to Sequence Learning with Neural Networks [link]Paper  bibtex   
Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images. Nguyen, A., Yosinski, J., & Clune, J. arXiv:1412.1897 [cs], December, 2014. arXiv: 1412.1897
Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images [link]Paper  abstract   bibtex   
21.7 A 1.8 mW PLL-free channelized 2.4 GHz ZigBee receiver utilizing fixed-LO temperature-compensated FBAR resonator. Wang, K., Koo, J., Ruby, R., & Otis, B. In Solid-State Circuits Conference Digest of Technical Papers (ISSCC), 2014 IEEE International, pages 372–373, 2014. IEEE.
21.7 A 1.8 mW PLL-free channelized 2.4 GHz ZigBee receiver utilizing fixed-LO temperature-compensated FBAR resonator [link]Paper  bibtex   
Densifying One Permutation Hashing via Rotation for Fast Near Neighbor Search. Shrivastava, A. & Li, P. In Proceedings of the 31st International Conference on International Conference on Machine Learning - Volume 32, of ICML'14, pages I–557–I–565, Beijing, China, 2014. JMLR.org.
Densifying One Permutation Hashing via Rotation for Fast Near Neighbor Search [link]Paper  abstract   bibtex   
Building fast Bayesian computing machines out of intentionally stochastic, digital parts. Mansinghka, V. & Jonas, E. arXiv:1402.4914 [cs, stat], February, 2014. arXiv: 1402.4914
Building fast Bayesian computing machines out of intentionally stochastic, digital parts [link]Paper  abstract   bibtex   
A 2.9 mW,+/- 85ppm accuracy reference clock generator based on RC oscillator with on-chip temperature calibration. Satoh, Y., Kobayashi, H., Miyaba, T., & Kousai, S. In VLSI Circuits Digest of Technical Papers, 2014 Symposium on, pages 1–2, 2014. IEEE.
bibtex   
2013 (5)
Formal verification of loop bound estimation for WCET analysis. Blazy, S., Maroneze, A., & Pichardie, D. In Working Conference on Verified Software: Theories, Tools, and Experiments, pages 281–303, 2013. Springer. tex.ids= blazyFormalVerificationLoop2013a, blazyFormalVerificationLoop2013b
bibtex   
Methodological Guidelines for Modelling and Design of Embedded Systems. Wolff, S. Aarhus University, Aarhus, Denmark, 2013.
bibtex   
A 467nW CMOS visual motion sensor with temporal averaging and pixel aggregation. Kim, G., Barangi, M., Foo, Z., Pinckney, N., Bang, S., Blaauw, D., & Sylvester, D. In Solid-State Circuits Conference Digest of Technical Papers (ISSCC), 2013 IEEE International, pages 480–481, 2013. IEEE.
bibtex   
Robust random chip ID generation with wide-aperture clocked comparators and maximum likelihood detection. Choi, Y. & Kim, J. In Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, pages 1014–1017, 2013. IEEE.
Robust random chip ID generation with wide-aperture clocked comparators and maximum likelihood detection [link]Paper  bibtex   
Security and reliability properties of syndrome coding techniques used in PUF key generation. Yu, M. D., M'Raihi, D., Devadas, S., & Verbauwhede, I. In GOMACTech Conference, pages 1–4, 2013.
Security and reliability properties of syndrome coding techniques used in PUF key generation [pdf]Paper  bibtex   
2012 (4)
A 280 nW, 100 kHz, 1-cycle start-up time, on-chip CMOS relaxation oscillator employing a feedforward period control scheme. Tokairin, T., Nose, K., Takeda, K., Noguchi, K., Maeda, T., Kawai, K., & Mizuno, M. In VLSI Circuits Symp. Dig. Tech. Papers, pages 16–17, 2012.
A 280 nW, 100 kHz, 1-cycle start-up time, on-chip CMOS relaxation oscillator employing a feedforward period control scheme [pdf]Paper  bibtex   
TARDIS: Time and remanence decay in SRAM to implement secure protocols on embedded devices without clocks. Rahmati, A., Salajegheh, M., Holcomb, D., Sorber, J., Burleson, W. P., & Fu, K. In Proceedings of the 21st USENIX conference on Security symposium, pages 36–36, 2012. USENIX Association.
bibtex   
A 32.4 ppm/° C 3.2-1.6 V self-chopped relaxation oscillator with adaptive supply generation. Hsiao, K. In VLSI Circuits (VLSIC), 2012 Symposium on, pages 14–15, 2012. IEEE.
A 32.4 ppm/° C 3.2-1.6 V self-chopped relaxation oscillator with adaptive supply generation [link]Paper  bibtex   
A 5.58 nW 32.768 kHz DLL-assisted XO for real-time clocks in wireless sensing applications. Yoon, D., Sylvester, D., & Blaauw, D. In Solid-State Circuits Conference Digest of Technical Papers (ISSCC), 2012 IEEE International, pages 366–368, 2012. IEEE.
A 5.58 nW 32.768 kHz DLL-assisted XO for real-time clocks in wireless sensing applications [link]Paper  bibtex   
2011 (4)
大功率液力变矩器叶轮强度有限元分析. 闫清东, 刘树成, 姚寿文, & 李晋 兵工学报, 32(2):141–146, 2011.
大功率液力变矩器叶轮强度有限元分析 [link]Paper  bibtex   
A testing methodology for side-channel resistance validation. Gilbert Goodwill, B. J., Jaffe, J., Rohatgi, P., & others In NIST Non-invasive attack testing workshop, 2011.
A testing methodology for side-channel resistance validation [pdf]Paper  bibtex   
A true random number generator using time-dependent dielectric breakdown. Liu, N., Pinckney, N., Hanson, S., Sylvester, D., & Blaauw, D. In VLSI Circuits (VLSIC), 2011 Symposium on, pages 216–217, 2011. IEEE.
A true random number generator using time-dependent dielectric breakdown [link]Paper  bibtex   
A 0.27 V 30MHz 17.7 nJ/transform 1024-pt complex FFT core with super-pipelining. Seok, M., Jeon, D., Chakrabarti, C., Blaauw, D., & Sylvester, D. In Solid-State Circuits Conference Digest of Technical Papers (ISSCC), 2011 IEEE International, pages 342–344, 2011. IEEE.
A 0.27 V 30MHz 17.7 nJ/transform 1024-pt complex FFT core with super-pipelining [link]Paper  bibtex   
2010 (3)
The Landscape of Digital Humanities. Svensson, P. Digital Humanities Quarterly, 2010. 00000
The Landscape of Digital Humanities [link]Paper  bibtex   
Trust Online: Young Adults' Evaluation of Web Content. Hargittai, E., Fullerton, L., Menchen-Trevino, E., & Thomas, K. Y. International Journal of Communication, April, 2010. 27
abstract   bibtex   
2.4 GHz 7mW all-digital PVT-variation tolerant True Random Number Generator in 45nm CMOS. Srinivasan, S., Mathew, S., Ramanarayanan, R., Sheikh, F., Anders, M., Kaul, H., Erraguntla, V., Krishnamurthy, R., & Taylor, G. In VLSI Circuits (VLSIC), 2010 IEEE Symposium on, pages 203–204, 2010. IEEE.
2.4 GHz 7mW all-digital PVT-variation tolerant True Random Number Generator in 45nm CMOS [link]Paper  bibtex   
2009 (4)
A 150pW program-and-hold timer for ultra-low-power sensor platforms. Lin, Y., Sylvester, D. M., & Blaauw, D. T. In Solid-State Circuits Conference-Digest of Technical Papers, 2009. ISSCC 2009. IEEE International, pages 326–327, 2009. IEEE.
bibtex   
Hardware Trojan by Hot Carrier Injection. Shiyanovskii, Y., Wolff, F., Papachristou, C., Weyer, D., & Clay, W. arXiv:0906.3832 [cs], June, 2009. arXiv: 0906.3832
Hardware Trojan by Hot Carrier Injection [link]Paper  abstract   bibtex   
Silicon physical unclonable function resistant to a 1025-trial brute force attack in 90 nm cmos. Stanzione, S. & Iannaccone, G. Power (PW), 30:38, 2009.
Silicon physical unclonable function resistant to a 1025-trial brute force attack in 90 nm cmos [pdf]Paper  bibtex   
A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. Padmavathi, D. G. & Shanmugapriya, M. D. arXiv:0909.0576 [cs], September, 2009. arXiv: 0909.0576
A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks [link]Paper  abstract   bibtex   
2008 (3)
基于二次函数环量分配的液力变矩器叶片设计方法. 刘伟辉, 刘春宝, 汪清波, 马文星, & 褚亚旭 农业机械学报, 2008.
abstract   bibtex   
A temperature-compensated low-noise digitally-controlled crystal oscillator for multi-standard applications. Tsai, M., Yeh, C., Cho, Y., Ke, L., Chen, P., & Dehng, G. In Radio Frequency Integrated Circuits Symposium, 2008. RFIC 2008. IEEE, pages 533–536, 2008. IEEE.
A temperature-compensated low-noise digitally-controlled crystal oscillator for multi-standard applications [link]Paper  bibtex   
Distributed Double Spending Prevention. Hoepman, J. arXiv:0802.0832 [cs], February, 2008. arXiv: 0802.0832
Distributed Double Spending Prevention [link]Paper  abstract   bibtex   
2007 (2)
Active Hardware Metering for Intellectual Property Protection and Security. Alkabani, Y. & Koushanfar, F. In USENIX security symposium, pages 291–306, 2007.
bibtex   
ISSCC 2007/SESSION 22/DIGITAL CIRCUIT INNOVATIONS/22.5. Su, Y., Holleman, J., & Otis, B. 2007.
ISSCC 2007/SESSION 22/DIGITAL CIRCUIT INNOVATIONS/22.5 [pdf]Paper  bibtex   
2006 (1)
State of the Art in True Random Number Generation. Sunar, B. 2006.
State of the Art in True Random Number Generation [pdf]Paper  bibtex   
2005 (1)
DigEuLit–a European framework for digital literacy: a progress report. Martin, A. Journal of eLiteracy, 2:130–136, 2005. Publisher: Citeseer
bibtex   
2004 (3)
Restoration of West Coast Renosterveld: facilitating the return of a highly threatened vegetation type. Krug, C B, Krug, R M, Iponga, D M, Walton, B A, Milton, S J, & Shiponeni, N N 2004. 00004
abstract   bibtex   
Reconstructing West Coast Renosterveld: past and present ecological processes in a Mediterranean shrubland of South Africa. Krug, R. M., Krug, C B, Midoko-Iponga, D., Walton, B A, Milton, S J, Newton, I P, Farley, N, & Shiponeni, N N Ecology, Conservation and Management of Mediterranean Ecosystems. Proceedings of the 10th International Conference on Mediterranean Ecosystems, April 25 – May 1, 2204, Rhodes, Greece., 2004. 00009
Reconstructing West Coast Renosterveld: past and present ecological processes in a Mediterranean shrubland of South Africa [pdf]Paper  bibtex   
Copilot-a Coprocessor-based Kernel Runtime Integrity Monitor. Petroni Jr, N. L., Fraser, T., Molina, J., & Arbaugh, W. A. In USENIX Security Symposium, pages 179–194, 2004. San Diego, USA.
bibtex   
2003 (2)
三种湍流模式数值模拟直角弯管内三维分离流动的比较. 丁珏 & 翁培奋 计算物理, 20(5):386–390, 2003.
bibtex   
Secure routing in wireless sensor networks: Attacks and countermeasures. Karlof, C. & Wagner, D. Ad hoc networks, 1(2):293–315, 2003.
Secure routing in wireless sensor networks: Attacks and countermeasures [link]Paper  bibtex   
2002 (1)
Design of an on&# 8211; chip random number generator using metastability. Kinniment, D. J. & Chester, E. G. In Solid-State Circuits Conference, 2002. ESSCIRC 2002. Proceedings of the 28th European, pages 595–598, 2002. IEEE.
Design of an on&# 8211; chip random number generator using metastability [link]Paper  bibtex   
2000 (1)
A noise-based IC random number generator for applications in cryptography. Petrie, C. S. & Connelly, J. A. Circuits and Systems I: Fundamental Theory and Applications, IEEE Transactions on, 47(5):615–621, 2000.
A noise-based IC random number generator for applications in cryptography [link]Paper  bibtex   
1999 (4)
Bro: a system for detecting network intruders in real-time. Paxson, V. Computer networks, 31(23):2435–2463, 1999.
bibtex   1 download  
Snort - Lightweight Intrusion Detection for Networks. Roesch, M. In Proceedings of the 13th USENIX Conference on System Administration, of LISA '99, pages 229–238, Berkeley, CA, USA, 1999. USENIX Association. event-place: Seattle, Washington
Snort - Lightweight Intrusion Detection for Networks [link]Paper  abstract   bibtex   
The Intel random number generator. Jun, B. & Kocher, P. Cryptography Research Inc. white paper, 1999.
The Intel random number generator [pdf]Paper  bibtex   
Design Principles for Tamper-Resistant Smartcard Processors. Kömmerling, O. & Kuhn, M. G. Smartcard, 99:9–20, 1999.
Design Principles for Tamper-Resistant Smartcard Processors. [pdf]Paper  bibtex   
1997 (1)
An integrated analog/digital random noise source. Holman, W. T., Connelly, J. A., & Dowlatabadi, A. B. Circuits and Systems I: Fundamental Theory and Applications, IEEE Transactions on, 44(6):521–528, 1997.
An integrated analog/digital random noise source [link]Paper  bibtex   
1996 (1)
Wirkung der raeumlichen Heterogenitaet innerhalb eines Habitats auf die mittlere Ueberlebensdauer einer Zauneidechsen-Population. Krug, R M, Johst, K, Wissel, C, & Maertens, B Verhandlungen der Gesellschaft fuer Oekologie, 1996. 00000
bibtex   
1989 (1)
液力变矩器叶片设计和特性计算的通用程序及其应用. 马文星, 罗邦杰, & 吴淑荣 汽车技术, 1989.
abstract   bibtex   
1988 (1)
应用激光多普勒流速计测定液力变矩器内部流场的探讨. 过学迅 工程机械, 1988.
应用激光多普勒流速计测定液力变矩器内部流场的探讨 [link]Paper  abstract   bibtex   
1984 (1)
液力变矩器制造误差对其性能的影响. 朱经昌 兵工学报(坦克装甲车与发动机分册), 1984.
abstract   bibtex   
undefined (14)
Bringing Science to Management: using Simulation- and Scenario-Based Approaches to Guide Decision Making in Invasive Species Management — one tool which can do both. Krug, R. M In 00000
bibtex   
A MATLAB GUI for the analysis and reconstruction of signal and image data of a SAFT-based 3D Ultrasound Computer Tomograph. Hopp, T., Schwarzenberg, G. F, Zapf, M., & Ruiter, N. V 00004
abstract   bibtex   
Variability Modeling and Statistical Parameter Extraction for CMOS Devices. Qian, K.
bibtex   
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces. Martinovic, I., Davies, D., Frank, M., Perito, D., Ros, T., & Song, D.
abstract   bibtex   
Evaluation of On-chip Decoupling Capacitor’s Effect on AES Cryptographic Circuit. Nakai, T., Shiozaki, M., Kubota, T., & Fujino, T.
abstract   bibtex   
Sancus: Low-cost trustworthy extensible networked devices with a zero-software Trusted Computing Base. Noorman, J., Agten, P., Daniels, W., Strackx, R., Herrewege, A. V., Huygens, C., Preneel, B., Verbauwhede, I., & Piessens, F.
abstract   bibtex   
A Full-mode FME VLSI Architecture Based on 8x8/4x4 Adaptive Hadamard Transform For QFHD H.264/AVC Encoder. Liu, J., Chen, X., Fan, Y., & Zeng, X.
abstract   bibtex   
ARMing TrustZone with User-space Enclaves. Brasser, F., Gens, D., Jauernig, P., Sadeghi, A., & Stapf, E.
abstract   bibtex   
On the Formal Foundations of PUFs and Related Primitives. Rührmair, U.
bibtex   
Stochastic Architectures for Probabilistic Computation. Jonas, E. M
abstract   bibtex   
Probabilistic CMOS (PCMOS) Logic for Nanoscale Circuit Design. Palem, K. V, Korkmaz, P., Yeo, K., & Kong, Z.
bibtex   
Breakthrough silicon scanning discovers backdoor in military chip (DRAFT of 05 March 2012). Skorobogatov, S. & Woods, C.
Breakthrough silicon scanning discovers backdoor in military chip (DRAFT of 05 March 2012) [pdf]Paper  bibtex   
A Memory Encryption Engine Suitable for General Purpose Processors. Gueron, S.
abstract   bibtex   
A Probabilistic CMOS Switch and its Realization by Exploiting Noise. Cheemalavagu, S., Korkmaz, P., Palem, K. V, Akgul, B. E S, & Chakrapani, L. N
abstract   bibtex