Runtime Integrity Verification in Cyber-physical Systems using Side-Channel Fingerprint Read more about Runtime Integrity Verification in Cyber-physical Systems using Side-Channel Fingerprint
Innovations in IoT for a Safe, Secure, and Sustainable Future Read more about Innovations in IoT for a Safe, Secure, and Sustainable Future
Special Session: Countering IP Security threats in Supply chain Read more about Special Session: Countering IP Security threats in Supply chain
Quality Obfuscation for Error-Tolerant and Adaptive Hardware IP Protection Read more about Quality Obfuscation for Error-Tolerant and Adaptive Hardware IP Protection
SURF: Joint Structural Functional Attack on Logic Locking Read more about SURF: Joint Structural Functional Attack on Logic Locking
An Intrinsic and Database-Free Authentication by Exploiting Process Variation in Back-End Capacitors Read more about An Intrinsic and Database-Free Authentication by Exploiting Process Variation in Back-End Capacitors
Countering counterfeit drugs: A technique used for detecting explosives can also verify the integrity of medicines Read more about Countering counterfeit drugs: A technique used for detecting explosives can also verify the integrity of medicines
Countering counterfeit drugs: A technique used for detecting explosives can also verify the integrity of medicines Read more about Countering counterfeit drugs: A technique used for detecting explosives can also verify the integrity of medicines
Ultrasound radiation force for the assessment of bone fracture healing in children: An in vivo pilot study Read more about Ultrasound radiation force for the assessment of bone fracture healing in children: An in vivo pilot study
Background Removal and Vessel Filtering of Noncontrast Ultrasound Images of Microvasculature Read more about Background Removal and Vessel Filtering of Noncontrast Ultrasound Images of Microvasculature