IIPS: Infrastructure IP for Secure SoC Design Read more about IIPS: Infrastructure IP for Secure SoC Design
How Secure Are Printed Circuit Boards Against Trojan Attacks? Read more about How Secure Are Printed Circuit Boards Against Trojan Attacks?
Guest Editorial Computing in Emerging Technologies (Second Issue) Read more about Guest Editorial Computing in Emerging Technologies (Second Issue)
Exploring Spin Transfer Torque Devices for Unconventional Computing Read more about Exploring Spin Transfer Torque Devices for Unconventional Computing
A Memory-Based Logic Block With Optimized-for-Read SRAM for Energy-Efficient Reconfigurable Computing Fabric Read more about A Memory-Based Logic Block With Optimized-for-Read SRAM for Energy-Efficient Reconfigurable Computing Fabric
Wearables, Implants, and Internet of Things: The Technology Needs in the Evolving Landscape Read more about Wearables, Implants, and Internet of Things: The Technology Needs in the Evolving Landscape
Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction] Read more about Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]
SMA: A System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware Read more about SMA: A System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware
Security Primitive Design with Nanoscale Devices: A Case Study with Resistive RAM Read more about Security Primitive Design with Nanoscale Devices: A Case Study with Resistive RAM