Board security enhancement using new locking SIB-based architectures. Dworak, J., Conroy, Z., Crouch, A. L., & Potter, J. C. In ITC, pages 1-10, 2014. IEEE Computer Society.
Link
Paper bibtex @inproceedings{ conf/itc/DworakCCP14,
added-at = {2015-08-26T00:00:00.000+0200},
author = {Dworak, Jennifer and Conroy, Zoe and Crouch, Alfred L. and Potter, John C.},
biburl = {http://www.bibsonomy.org/bibtex/270b7de63cd174564c090fe448682f6a3/dblp},
booktitle = {ITC},
crossref = {conf/itc/2014},
ee = {http://doi.ieeecomputersociety.org/10.1109/TEST.2014.7035355},
interhash = {7b7458fb8e03a2ea3b9757fa092d3714},
intrahash = {70b7de63cd174564c090fe448682f6a3},
isbn = {978-1-4799-4722-5},
keywords = {dblp},
pages = {1-10},
publisher = {IEEE Computer Society},
title = {Board security enhancement using new locking SIB-based architectures.},
url = {http://dblp.uni-trier.de/db/conf/itc/itc2014.html#DworakCCP14},
year = {2014}
}
Downloads: 0
{"_id":"4yNKEY4BiPwpBp3mP","bibbaseid":"dworak-conroy-crouch-potter-boardsecurityenhancementusingnewlockingsibbasedarchitectures-2014","downloads":0,"creationDate":"2015-09-08T15:38:34.370Z","title":"Board security enhancement using new locking SIB-based architectures.","author_short":["Dworak, J.","Conroy, Z.","Crouch, A.<nbsp>L.","Potter, J.<nbsp>C."],"year":2014,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/john?items=1000","bibdata":{"added-at":"2015-08-26T00:00:00.000+0200","author":["Dworak, Jennifer","Conroy, Zoe","Crouch, Alfred L.","Potter, John C."],"author_short":["Dworak, J.","Conroy, Z.","Crouch, A.<nbsp>L.","Potter, J.<nbsp>C."],"bibtex":"@inproceedings{ conf/itc/DworakCCP14,\n added-at = {2015-08-26T00:00:00.000+0200},\n author = {Dworak, Jennifer and Conroy, Zoe and Crouch, Alfred L. and Potter, John C.},\n biburl = {http://www.bibsonomy.org/bibtex/270b7de63cd174564c090fe448682f6a3/dblp},\n booktitle = {ITC},\n crossref = {conf/itc/2014},\n ee = {http://doi.ieeecomputersociety.org/10.1109/TEST.2014.7035355},\n interhash = {7b7458fb8e03a2ea3b9757fa092d3714},\n intrahash = {70b7de63cd174564c090fe448682f6a3},\n isbn = {978-1-4799-4722-5},\n keywords = {dblp},\n pages = {1-10},\n publisher = {IEEE Computer Society},\n title = {Board security enhancement using new locking SIB-based architectures.},\n url = {http://dblp.uni-trier.de/db/conf/itc/itc2014.html#DworakCCP14},\n year = {2014}\n}","bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bibtex/270b7de63cd174564c090fe448682f6a3/dblp","booktitle":"ITC","crossref":"conf/itc/2014","ee":"http://doi.ieeecomputersociety.org/10.1109/TEST.2014.7035355","id":"conf/itc/DworakCCP14","interhash":"7b7458fb8e03a2ea3b9757fa092d3714","intrahash":"70b7de63cd174564c090fe448682f6a3","isbn":"978-1-4799-4722-5","key":"conf/itc/DworakCCP14","keywords":"dblp","pages":"1-10","publisher":"IEEE Computer Society","title":"Board security enhancement using new locking SIB-based architectures.","type":"inproceedings","url":"http://dblp.uni-trier.de/db/conf/itc/itc2014.html#DworakCCP14","year":"2014","bibbaseid":"dworak-conroy-crouch-potter-boardsecurityenhancementusingnewlockingsibbasedarchitectures-2014","role":"author","urls":{"Link":"http://doi.ieeecomputersociety.org/10.1109/TEST.2014.7035355","Paper":"http://dblp.uni-trier.de/db/conf/itc/itc2014.html#DworakCCP14"},"keyword":["dblp"],"downloads":0},"search_terms":["board","security","enhancement","using","new","locking","sib","based","architectures","dworak","conroy","crouch","potter"],"keywords":["dblp"],"authorIDs":[],"dataSources":["e3DPfiLXyfZxic3k2"]}