Hardware virtualization for protection against power analysis attack Read more about Hardware virtualization for protection against power analysis attack
Hardware Trojan attacks in embedded memory Read more about Hardware Trojan attacks in embedded memory
Development and Evaluation of Hardware Obfuscation Benchmarks Read more about Development and Evaluation of Hardware Obfuscation Benchmarks
Robust Timing Attack Countermeasure on Virtual Hardware Read more about Robust Timing Attack Countermeasure on Virtual Hardware
ArtiFact: Architecture and CAD Flow for Efficient Formal Verification of SoC Security Policies Read more about ArtiFact: Architecture and CAD Flow for Efficient Formal Verification of SoC Security Policies
Authentication of dietary supplements through Nuclear Quadrupole Resonance (NQR) spectroscopy Read more about Authentication of dietary supplements through Nuclear Quadrupole Resonance (NQR) spectroscopy
Scalable Test Generation for Trojan Detection Using Side Channel Analysis Read more about Scalable Test Generation for Trojan Detection Using Side Channel Analysis
Dynamics of Intrinsic Glucose Uptake Kinetics in Human Mesenchymal Stem Cells During Chondrogenesis Read more about Dynamics of Intrinsic Glucose Uptake Kinetics in Human Mesenchymal Stem Cells During Chondrogenesis
ROCK Inhibition Promotes the Development of Chondrogenic Tissue by Improved Mass Transport Read more about ROCK Inhibition Promotes the Development of Chondrogenic Tissue by Improved Mass Transport
Opto-mechanical programming of micro-scale information on transparent multilayer shape memory film Read more about Opto-mechanical programming of micro-scale information on transparent multilayer shape memory film