Sciweavers

6 search results - page 2 / 2
» A Procedure for Verifying Security Against Type Confusion At...
Sort
View
HOST
2008
IEEE
13 years 11 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach