|
|
|
|
Jian Wang and Ying Li
Ensuring the security of IoT devices and chips at runtime has become an urgent task as they have been widely used in human life. Embedded memories are vital components of SoC (System on Chip) in these devices. If they are attacked or incur faults at runt...
ver más
|
|
|
|
|
|
Kazuki Nakamura, Koji Hori and Shoichi Hirose
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on. Thus, the security of their hardware implementations is an import...
ver más
|
|
|
|
|
|
Yongjing Wang, Yi Wang and Xiaoliang Feng
In this work, the ship relative integrated navigation approaches are studied for the navigation scenarios with the measurements disturbed by unknown statistical property noises and with the injected fault measurement attacks. On the basis of the limited ...
ver más
|
|
|
|
|
|
Antoine Rauzy and Liu Yang
In this article, we propose decision diagram algorithms to extract minimal cutsets of finite degradation models. Finite degradation models generalize and unify combinatorial models used to support probabilistic risk, reliability and safety analyses (faul...
ver más
|
|
|