Search dblp for Publications

export results for "toc:db/journals/jhss/jhss5.bht:"

 download as .bib file

@article{DBLP:journals/jhss/AbbasiJBTD21,
  author       = {Hossein Abbasi and
                  Naser Ezzati{-}Jivan and
                  Martine Bella{\"{\i}}che and
                  Chamseddine Talhi and
                  Michel R. Dagenais},
  title        = {The Use of Anomaly Detection for the Detection of Different Types
                  of DDoS Attacks in Cloud Environment},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {208--222},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-021-00119-z},
  doi          = {10.1007/S41635-021-00119-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/AbbasiJBTD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/DaneshBR21,
  author       = {Wafi Danesh and
                  Joshua Banago and
                  Mostafizur Rahman},
  title        = {Turning the Table: Using Bitstream Reverse Engineering to Detect {FPGA}
                  Trojans},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {237--246},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-021-00122-4},
  doi          = {10.1007/S41635-021-00122-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/DaneshBR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/DasSMDC21,
  author       = {Bijoy Das and
                  Amit Sardar and
                  Swapan Maiti and
                  Abhijit Das and
                  Dipanwita Roy Chowdhury},
  title        = {An Attack on Linear Scan Chains for Stream Ciphers and the Impossibility
                  of Simple Countermeasures},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {191--207},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-021-00118-0},
  doi          = {10.1007/S41635-021-00118-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/DasSMDC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/HuangZSZLG21,
  author       = {Zenan Huang and
                  Xiao Zhang and
                  Jiebin Su and
                  Zhixin Zhou and
                  Hongyin Luo and
                  Donghui Guo},
  title        = {Reconfigurable {TPM} Implemented with Ultralow-Power Management in
                  28nm {CMOS} Process for IoT SoC Design},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {32--44},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-020-00109-7},
  doi          = {10.1007/S41635-020-00109-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/HuangZSZLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/JorgensenWPZ21,
  author       = {Erik J. Jorgensen and
                  Frank T. Werner and
                  Milos Prvulovic and
                  Alenka G. Zajic},
  title        = {Deep Learning Classification of Motherboard Components by Leveraging
                  {EM} Side-Channel Signals},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {114--126},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-021-00116-2},
  doi          = {10.1007/S41635-021-00116-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/JorgensenWPZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/KaurD21,
  author       = {Jaspinder Kaur and
                  Shirshendu Das},
  title        = {A Survey on Cache Timing Channel Attacks for Multicore Processors},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {169--189},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-021-00115-3},
  doi          = {10.1007/S41635-021-00115-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/KaurD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/LavaudGGBNM21,
  author       = {Corentin Lavaud and
                  Robin Gerzaguet and
                  Matthieu Gautier and
                  Olivier Berder and
                  Erwan Nogues and
                  St{\'{e}}phane Molton},
  title        = {Whispering Devices: {A} Survey on How Side-channels Lead to Compromised
                  Information},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {143--168},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-021-00112-6},
  doi          = {10.1007/S41635-021-00112-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/LavaudGGBNM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/LiuCSRL21,
  author       = {Bozhi Liu and
                  Kemeng Chen and
                  Minjun Seo and
                  Janet Meiling Roveda and
                  Roman Lysecky},
  title        = {Methods and Analysis of Automated Trace Alignment Under Power Obfuscation
                  in Side Channel Attacks},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {127--142},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-021-00117-1},
  doi          = {10.1007/S41635-021-00117-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/LiuCSRL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/NicholasSJWS21,
  author       = {Geraldine Shirley Nicholas and
                  Ali Shuja Siddiqui and
                  Sam Reji Joseph and
                  Gregory Williams and
                  Fareena Saqib},
  title        = {A Secure Boot Framework with Multi-security Features and Logic-Locking
                  Applications for Reconfigurable Logic},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {260--268},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-021-00123-3},
  doi          = {10.1007/S41635-021-00123-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/NicholasSJWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/PhillipsAS21,
  author       = {Prudence Phillips and
                  Olaide R. Afolabi and
                  Hassan Salmani},
  title        = {Experimental Data Anomaly Detection at Edge Sensor Nodes Using Physics
                  Laws},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {19--31},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-020-00101-1},
  doi          = {10.1007/S41635-020-00101-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/PhillipsAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/PottJCES21,
  author       = {Claudius Pott and
                  Philipp Jungklass and
                  David Jacek Csejka and
                  Thomas Eisenbarth and
                  Marco Siebert},
  title        = {Firmware Security Module},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {103--113},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-021-00114-4},
  doi          = {10.1007/S41635-021-00114-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/PottJCES21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/RaiTM21,
  author       = {Vikash Kumar Rai and
                  Somanath Tripathy and
                  Jimson Mathew},
  title        = {Design and Analysis of Reconfigurable Cryptographic Primitives: {TRNG}
                  and {PUF}},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {247--259},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-021-00120-6},
  doi          = {10.1007/S41635-021-00120-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/RaiTM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/RajamanikkamSRC21,
  author       = {Chidhambaranathan Rajamanikkam and
                  Rajesh J. S. and
                  Sanghamitra Roy and
                  Koushik Chakraborty},
  title        = {Understanding Security Threats in Emerging Neuromorphic Computing
                  Architecture},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {45--57},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-021-00110-8},
  doi          = {10.1007/S41635-021-00110-8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jhss/RajamanikkamSRC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/RoyD21,
  author       = {Dibyendu Roy and
                  Deepak Kumar Dalai},
  title        = {An Observation of Non-randomness in NFSR-Based Stream Ciphers with
                  Reduced Initialization Round},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {89--102},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-021-00113-5},
  doi          = {10.1007/S41635-021-00113-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/RoyD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/ShomajiGGKWF21,
  author       = {Sumaiya Shomaji and
                  Zimu Guo and
                  Fatemeh Ganji and
                  Nima Karimian and
                  Damon L. Woodard and
                  Domenic Forte},
  title        = {BLOcKeR: {A} Biometric Locking Paradigm for IoT and the Connected
                  Person},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {223--236},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-021-00121-5},
  doi          = {10.1007/S41635-021-00121-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/ShomajiGGKWF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/TchendjiMDY21,
  author       = {Vianney Kengne Tchendji and
                  Fabrice Mvah and
                  Cl{\'{e}}mentin Tayou Djam{\'{e}}gni and
                  Yannick Florian Yankam},
  title        = {E2BaSeP: Efficient Bayes Based Security Protocol Against {ARP} Spoofing
                  Attacks in {SDN} Architectures},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {58--74},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-020-00105-x},
  doi          = {10.1007/S41635-020-00105-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/TchendjiMDY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/WeidlerGC21,
  author       = {Nathanael R. Weidler and
                  Ryan M. Gerdes and
                  Thidapat Chantem},
  title        = {On the Limitations of Obfuscating Redundant Circuits in Frustrating
                  Hardware Trojan Implantation},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {75--87},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-021-00111-7},
  doi          = {10.1007/S41635-021-00111-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/WeidlerGC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/YilmazAH21,
  author       = {Yildiran Yilmaz and
                  Leonardo Aniello and
                  Basel Halak},
  title        = {{ASSURE:} {A} Hardware-Based Security Protocol for Resource-Constrained
                  IoT Systems},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {1--18},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-020-00102-0},
  doi          = {10.1007/S41635-020-00102-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/YilmazAH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics