Search results for: Edwin Kan
Lecture Notes in Computer Science > Trust and Trustworthy Computing > Session 5: Hardware Trust > 188-201
2013 IEEE Symposium on Security and Privacy > 271 - 285
IEEE Custom Integrated Circuits Conference 2006 > 869 - 872