Team for Research in
Ubiquitous Secure Technology

Hardware Authentication Leveraging Performance Limits in Detailed Simulations and Emulations

Citation
"Hardware Authentication Leveraging Performance Limits in Detailed Simulations and Emulations". Daniel Y. Deng, Andrew H. Chan, and G. Edward Suh (eds.), Proceedings of the 46th Design Automation Conference (DAC'09), July, 2009.

Abstract
(No abstract.)

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
     <a
    href="http://www.truststc.org/pubs/711.html"
    ><i>Hardware Authentication Leveraging Performance
    Limits in Detailed Simulations and
    Emulations</i></a>, Daniel Y. Deng, Andrew H.
    Chan, and G. Edward Suh (eds.), Proceedings of the 46th
    Design Automation Conference (DAC'09), July, 2009.
  • Plain text
     "Hardware Authentication Leveraging Performance Limits
    in Detailed Simulations and Emulations". Daniel Y.
    Deng, Andrew H. Chan, and G. Edward Suh (eds.), Proceedings
    of the 46th Design Automation Conference (DAC'09), July,
    2009.
  • BibTeX
    @proceedings{DengChanSuh09_HardwareAuthenticationLeveragingPerformanceLimitsInDetailed,
        title = {Hardware Authentication Leveraging Performance
                  Limits in Detailed Simulations and Emulations},
        editor = {Daniel Y. Deng, Andrew H. Chan, and G. Edward Suh},
        organization = {Proceedings of the 46th Design Automation
                  Conference (DAC'09)},
        month = {July},
        year = {2009},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/711.html}
    }
    

Posted by Jessica Gamble on 6 Apr 2010.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.