Sciweavers

2290 search results - page 106 / 458
» Extensible Protected Types
Sort
View
105
Voted
INTEGRATION
1998
96views more  INTEGRATION 1998»
15 years 2 months ago
BIST for systems-on-a-chip
An increasing part of microelectronic systems is implemented on the basis of predesigned and preverified modules, so-called cores, which are reused in many instances. Core-provide...
Hans-Joachim Wunderlich
MR
2002
90views Robotics» more  MR 2002»
15 years 2 months ago
Correlation considerations: Real HBM to TLP and HBM testers
- This paper discusses the previously unexplored initial front rise differences between Real HBM, TLP and HBM tester waveshapes. The dV/dt of the HBM test pulse amplitude below 2% ...
Jon Barth, John Richner
123
Voted
JUCS
2010
155views more  JUCS 2010»
14 years 9 months ago
Watermarking Techniques for Relational Databases: Survey, Classification and Comparison
Abstract: Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, maintaining integrity of...
Raju Halder, Shantanu Pal, Agostino Cortesi
121
Voted
CORR
2010
Springer
113views Education» more  CORR 2010»
15 years 2 months ago
Game semantics for first-order logic
We refine HO/N game semantics with an additional notion of pointer (mu-pointers) and extend it to first-order classical logic with completeness results. We use a Church style exte...
Olivier Laurent
DFT
2008
IEEE
149views VLSI» more  DFT 2008»
15 years 4 months ago
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?
Side-channel attacks are nowadays a serious concern when implementing cryptographic algorithms. Powerful ways for gaining information about the secret key as well as various count...
Francesco Regazzoni, Thomas Eisenbarth, Luca Breve...