Search dblp for Publications

export results for "toc:db/conf/host/host2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/host/BangaH10,
  author       = {Mainak Banga and
                  Michael S. Hsiao},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Trusted {RTL:} Trojan Detection Methodology in Pre-silicon Designs},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {56--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513114},
  doi          = {10.1109/HST.2010.5513114},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BangaH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BarenghiBBPP10,
  author       = {Alessandro Barenghi and
                  Guido Bertoni and
                  Luca Breveglieri and
                  Mauro Pellicioli and
                  Gerardo Pelosi},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Low Voltage Fault Attacks to {AES}},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {7--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513121},
  doi          = {10.1109/HST.2010.5513121},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BarenghiBBPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BeckerKMP10,
  author       = {Georg T. Becker and
                  Markus Kasper and
                  Amir Moradi and
                  Christof Paar},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Side-channel based Watermarks for Integrated Circuits},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {30--35},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513117},
  doi          = {10.1109/HST.2010.5513117},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BeckerKMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BhargavaCM10,
  author       = {Mudit Bhargava and
                  Cagla Cakir and
                  Ken Mai},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Attack Resistant Sense Amplifier based PUFs {(SA-PUF)} with Deterministic
                  and Controllable Reliability of {PUF} Responses},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {106--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513106},
  doi          = {10.1109/HST.2010.5513106},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BhargavaCM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/Clark10,
  author       = {Christopher J. Clark},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Anti-tamper {JTAG} {TAP} Design Enables {DRM} to {JTAG} Registers
                  and {P1687} on-chip Instruments},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {19--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513119},
  doi          = {10.1109/HST.2010.5513119},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/Clark10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/FanGLH10,
  author       = {Xinxin Fan and
                  Guang Gong and
                  Ken Lauffenburger and
                  Troy Hicks},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {{FPGA} Implementations of the Hummingbird Cryptographic Algorithm},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {48--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513116},
  doi          = {10.1109/HST.2010.5513116},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/FanGLH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/FanGMSPV10,
  author       = {Junfeng Fan and
                  Xu Guo and
                  Elke De Mulder and
                  Patrick Schaumont and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {State-of-the-art of Secure {ECC} Implementations: {A} Survey on Known
                  Side-channel Attacks and Countermeasures},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {76--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513110},
  doi          = {10.1109/HST.2010.5513110},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/FanGMSPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/HeyszlS10,
  author       = {Johann Heyszl and
                  Frederic Stumpf},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Efficient One-pass Entity Authentication based on {ECC} for Constrained
                  Devices},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {88--93},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513107},
  doi          = {10.1109/HST.2010.5513107},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/HeyszlS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/KobayashiISOKKFVGMHNS10,
  author       = {Kazuyuki Kobayashi and
                  Jun Ikegami and
                  Kazuo Sakiyama and
                  Kazuo Ohta and
                  Miroslav Knezevic and
                  {\"{U}}nal Ko{\c{c}}abas and
                  Junfeng Fan and
                  Ingrid Verbauwhede and
                  Eric Xu Guo and
                  Shin'ichiro Matsuo and
                  Sinan Huang and
                  Leyla Nazhandali and
                  Akashi Satoh},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Prototyping Platform for Performance Evaluation of {SHA-3} Candidates},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {60--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513111},
  doi          = {10.1109/HST.2010.5513111},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/KobayashiISOKKFVGMHNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/KoushanfarA10,
  author       = {Farinaz Koushanfar and
                  Yousra Alkabani},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Provably Secure Obfuscation of Diverse Watermarks for Sequential Circuits},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {42--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513115},
  doi          = {10.1109/HST.2010.5513115},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/KoushanfarA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/LaohavaleesonP10,
  author       = {Ekarat Laohavaleeson and
                  Chintan Patel},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Current Flattening Circuit for {DPA} Countermeasure},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {118--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513104},
  doi          = {10.1109/HST.2010.5513104},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/LaohavaleesonP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MaghrebiGDF10,
  author       = {Houssem Maghrebi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Florent Flament},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Entropy-based Power Attack},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513124},
  doi          = {10.1109/HST.2010.5513124},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MaghrebiGDF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MaitiCMS10,
  author       = {Abhranil Maiti and
                  Jeff Casarona and
                  Luke McHale and
                  Patrick Schaumont},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {A Large Scale Characterization of {RO-PUF}},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {94--99},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513108},
  doi          = {10.1109/HST.2010.5513108},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MaitiCMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MenendezM10,
  author       = {Eric Menendez and
                  Ken Mai},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {A Comparison of Power-analysis-resistant Digital Circuits},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {64--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513112},
  doi          = {10.1109/HST.2010.5513112},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MenendezM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/NarasimhanCDPWPRB10,
  author       = {Seetharam Narasimhan and
                  Rajat Subhra Chakraborty and
                  Dongdong Du and
                  Somnath Paul and
                  Francis G. Wolff and
                  Christos A. Papachristou and
                  Kaushik Roy and
                  Swarup Bhunia},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Multiple-Parameter Side-Channel Analysis: {A} Non-invasive Hardware
                  Trojan Detection Approach},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {13--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513122},
  doi          = {10.1109/HST.2010.5513122},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/NarasimhanCDPWPRB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/NewgardH10,
  author       = {Bruce Newgard and
                  Colby Hoffman},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Using Multiple Processors in a Single Reconfigurable Fabric for High-assurance
                  Applications},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {25--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513120},
  doi          = {10.1109/HST.2010.5513120},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/NewgardH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/RajendranBMK10,
  author       = {Jeyavijayan Rajendran and
                  Hetal Borad and
                  Shyam Mantravadi and
                  Ramesh Karri},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {{SLICED:} Slide-based Concurrent Error Detection Technique for Symmetric
                  Block Ciphers},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {70--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513109},
  doi          = {10.1109/HST.2010.5513109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/RajendranBMK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/RosenfeldGK10,
  author       = {Kurt Rosenfeld and
                  Efstratios Gavas and
                  Ramesh Karri},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Sensor Physical Unclonable Functions},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {112--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513103},
  doi          = {10.1109/HST.2010.5513103},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/RosenfeldGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/SatohKSHA10,
  author       = {Akashi Satoh and
                  Toshihiro Katashita and
                  Takeshi Sugawara and
                  Naofumi Homma and
                  Takafumi Aoki},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Hardware Implementations of Hash Function Luffa},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {130--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513102},
  doi          = {10.1109/HST.2010.5513102},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/SatohKSHA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/SureshB10,
  author       = {Vikram B. Suresh and
                  Wayne P. Burleson},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Entropy Extraction in Metastability-based {TRNG}},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {135--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513099},
  doi          = {10.1109/HST.2010.5513099},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/SureshB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/TanimuraD10,
  author       = {Kazuyuki Tanimura and
                  Nikil D. Dutt},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {ExCCel: Exploration of Complementary Cells for Efficient {DPA} Attack
                  Resistivity},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {52--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513113},
  doi          = {10.1109/HST.2010.5513113},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/TanimuraD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/TeegardenBM10,
  author       = {Craig Teegarden and
                  Mudit Bhargava and
                  Ken Mai},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Side-channel Attack Resistant ROM-based {AES} S-Box},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {124--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513101},
  doi          = {10.1109/HST.2010.5513101},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/TeegardenBM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/YinQ10,
  author       = {Chi{-}En Daniel Yin and
                  Gang Qu},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {{LISA:} Maximizing {RO} PUF's Secret Extraction},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {100--105},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513105},
  doi          = {10.1109/HST.2010.5513105},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/YinQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ZienerBT10,
  author       = {Daniel Ziener and
                  Florian Baueregger and
                  J{\"{u}}rgen Teich},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Multiplexing Methods for Power Watermarking},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {36--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513118},
  doi          = {10.1109/HST.2010.5513118},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/ZienerBT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/host/2010,
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5507538/proceeding},
  isbn         = {978-1-4244-7810-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics