Toggle navigation
HN
Paper
All
Show
Ask
Jobs
Top stories
Today
Last 7 days
Last months
This year
Stats
Stories by godelmachine
Which Noun Phrases Denote Which Concepts? [pdf]
1 points
godelmachine
2018-05-22T09:06:00Z
aclanthology.info
Automated Design of Arbiter-Based PUF on FPGA Using Programmable Delay Lines [pdf]
2 points
godelmachine
2018-05-22T08:56:40Z
eprint.iacr.org
Streaming Memory-Augmented Neural Networks
1 points
godelmachine
2018-05-22T07:40:35Z
arxiv.org
SafeKeeper: protecting web passwords using trusted execution environments
2 points
godelmachine
2018-05-22T05:19:20Z
blog.acolyer.org
Efficient Erasable PUFs from Programmable Logic and Memristors [pdf]
2 points
godelmachine
2018-05-21T22:20:44Z
eprint.iacr.org
Hardware Enforced Fine Grained Policy Driven Security [pdf]
2 points
godelmachine
2018-05-21T16:41:12Z
domino.research.ibm.com
Trusted Computing on Heterogeneous Embedded Systems-On-Chip
2 points
godelmachine
2018-05-21T16:37:15Z
citeseerx.ist.psu.edu
Selecting the right secure hardware for your IoT deployment
1 points
godelmachine
2018-05-21T14:16:02Z
azure.microsoft.com
Primer on Hardware Security: Models, Methods, and Metrics [pdf]
2 points
godelmachine
2018-05-21T14:14:49Z
trust-hub.org
Operating system for security tagged architecture hardware [pdf]
2 points
godelmachine
2018-05-21T13:37:10Z
www.dtic.mil
Hardware Enforcement of Application Security Policies Using Tagged Memory
2 points
godelmachine
2018-05-21T13:27:34Z
www.usenix.org
Practical Secure Hardware Design for Embedded Systems [pdf]
1 points
godelmachine
2018-05-21T13:26:17Z
www.grandideastudio.com
Hardware Security Mechanism's [pdf]
1 points
godelmachine
2018-05-21T13:25:32Z
pdfs.semanticscholar.org
Electromagnetic Side Channels of an FPGA Implementation of AES [pdf]
3 points
godelmachine
2018-05-21T13:16:28Z
eprint.iacr.org
How to Break Secure Boot on FPGA SoCs Through Malicious Hardware [pdf]
2 points
godelmachine
2018-05-21T13:15:34Z
eprint.iacr.org
GraphQL vs. REST
2 points
godelmachine
2018-05-21T09:27:03Z
dev-blog.apollodata.com
Semantics and complexity of GraphQL
5 points
godelmachine
2018-05-21T05:05:34Z
blog.acolyer.org
Fault attacks on secure chips: from glitch to flash (2011) [pdf]
31 points
godelmachine
2018-05-20T16:04:38Z
www.cl.cam.ac.uk
Laser Fault Injection Attacks [pdf]
1 points
godelmachine
2018-05-20T16:04:06Z
emsec.rub.de
Single-Byte Laser Faults Using Large Spots [pdf]
1 points
godelmachine
2018-05-20T16:03:39Z
www.emse.fr
71
72
73
74
75
76
77
78
79
80