Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
trustworthy hardware (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/48)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
An overview of FPGA-inspired obfuscation techniques
Abideen, Zain Ul
;
Gokulanathan, Sumathi
;
Aljafar, Muayad J.
;
Pagliarini, Samuel Nascimento
ACM computing surveys
2024
/
art. 299, 35 p. : ill
https://doi.org/10.1145/3677118
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
2
journal article
An overview of FPGA-inspired obfuscation techniques
Abideen, Zain Ul
;
Gokulanathan, Sumathi
;
Aljafar, Muayad J.
;
Pagliarini, Samuel Nascimento
arXiv.org
2023
/
30 p. : ill
https://doi.org/10.48550/arXiv.2305.15999
journal article
Related publications
1
Leveraging FPGA Reconfigurability as an Obfuscation Asset = FPGA ümberkonfigureeritavuse rakendamine hägustamise vahendina
Number of records 2, displaying
1 - 2
keyword
47
1.
trustworthy hardware
2.
blockchain framework for trustworthy Ai
3.
trustworthy AI
4.
trustworthy artificial intelligence
5.
Trustworthy Voting
6.
communicating hardware/software systems
7.
communicating software/hardware systems
8.
computer hardware
9.
Computer software and hardware
10.
crypto-hardware
11.
DNN hardware accelerator
12.
Embedded hardware
13.
hardware
14.
hardware acceleration
15.
hardware accelerator
16.
hardware close programming
17.
hardware customization
18.
hardware design
19.
hardware for the IoT
20.
hardware implementation
21.
hardware in the loop
22.
hardware Obfuscation
23.
hardware problems
24.
hardware rejuvenation
25.
hardware reliability
26.
hardware security
27.
hardware security primitive
28.
Hardware Trojan
29.
hardware trojan horse
30.
Hardware Trojan Horses
31.
hardware trojans
32.
Hardware Trojans (HT)
33.
Hardware Verification
34.
hardware/software co-design
35.
hardware-in-the loop simulation
36.
hardware-in-the-loop
37.
Hardware-in-the-Loop simulation
38.
integer-only hardware
39.
open hardware
40.
open source hardware
41.
opensource hardware
42.
open-source hardware
43.
power-hardware-in-the-loop
44.
reconfigurable hardware
45.
software/hardware partitioning
46.
software/hardware systems
47.
special-purpose hardware
subject term
1
1.
Estonian Center for Safe and Trustworthy Artificial Intelligence (ECSTAI)
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT