Browsing Computer Science by Subject "Obfuscation"
Now showing items 1-2 of 2
(IEEE, 2011)With the combination of PUFs, obfuscation, and multi-boot, we are able to do the equivalent of partial bitstream encryption on low-cost FPGAs, which is only featured on high-end FPGAs. Low-cost FPGAs do not even have ...
Inference management, trust and obfuscation principles for quality of information in emerging pervasive environments (Elsevier, 2014-04)The emergence of large scale, distributed, sensor-enabled, machine-to-machine pervasive applications necessitates engaging with providers of information on demand to collect the information, of varying quality levels, to ...
Share this page