Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Ghobad Zarrinchian"'
Autor:
Ghobad Zarrinchian
Publikováno v:
Microprocessors and Microsystems. :104872
Publikováno v:
IEEE Transactions on Computers. 66:100-113
Hardware Trojan detection has been the subject of many studies in the realm of hardware security in the recent years. The effectiveness of current techniques proposed for Trojan detection is limited by some factors, process variation noise being a ma
Publikováno v:
Journal of Circuits, Systems and Computers. 29:2050097
Differential Power Analysis (DPA) attacks are known as viable and practical techniques to break the security of cryptographic algorithms. In this type of attack, an adversary extracts the encryption key based on the correlation of consumed power of t
Publikováno v:
The Journal of Supercomputing. 66:488-513
High performance clusters, which are established by connecting many computing nodes together, are known as one of main architectures to obtain extremely high performance. Currently, these systems are moving from multi-core architectures to many-core
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783642301100
The number of processing cores within computing nodes which are used in current clustered systems, are growing up rapidly. Despite this trend, the number of available network interfaces in such nodes almost has been remained unchanged. This issue can
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1d545bca90152070aca486287c6d0192
https://doi.org/10.1007/978-3-642-30111-7_101
https://doi.org/10.1007/978-3-642-30111-7_101