Search results
Lecture Notes in Computer Science > Reconfigurable Computing: Architectures, Tools and Applications > Posters > 306-311
Lecture Notes in Computer Science > Computer Aided Systems Theory - EUROCAST 2009 > Signal Processing Methods in Systems Design and Cybernetics > 563-570
Advances in Intelligent and Soft Computing > Man-Machine Interactions > Embedded Systems Applications > 663-669
Lecture Notes in Computer Science > Trust and Trustworthy Computing > Session 2: Physically Unclonable Functions > 33-47
Communications in Computer and Information Science > Information Computing and Applications > Multimedia Networking and Computing > 212-219
Communications in Computer and Information Science > Information Technology and Mobile Communication > Full Paper > 87-94
Lecture Notes in Computer Science > Evolvable Systems: From Biology to Hardware > Digital Hardware Evolution > 35-44
Lecture Notes in Computer Science > Information Security Applications > Efficient Implementation > 360-374
Lecture Notes in Computer Science > Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication > Security and Cryptography > 208-223
Lecture Notes in Computer Science > Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications > Image Coding, Processing and Analysis > 95-102
Lecture Notes in Computer Science > Field-Programmable Logic and Applications: The Roadmap to Reconfigurable Computing > Mobile Communication > 322-331
Advances in Intelligent and Soft Computing > Advances in Computer Science, Intelligent System and Environment > 183-188
Lecture Notes in Computer Science > Pattern Recognition in Bioinformatics > Applications of High Performance Computing > 436-447
Lecture Notes in Electrical Engineering > Advances in Electrical Engineering and Electrical Machines > 231-237
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems, CHES 2010 > Tamper Resistance and Hardware Trojans > 188-202