Towards Energy-Efficient and Secure Computing Systems
Countermeasures against diverse security threats typically incur noticeable hardware cost and power overhead, which may become the obstacle for those countermeasures to be applicable in energy-efficient computing systems. This work presents a summary of energy-efficiency techniques that have been ap...
Main Authors: | Zhiming Zhang, Qiaoyan Yu |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2018-11-01
|
Series: | Journal of Low Power Electronics and Applications |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9268/8/4/48 |
Similar Items
-
Overview of the detection and prevention study of hardware Trojans
by: Qiang XU,Xing-hao JIANG1,Li-hong YAO, et al.
Published: (2017-04-01) -
Introduction to Hardware Security
by: Yier Jin
Published: (2015-10-01) -
Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
by: Musharraf Hussain, et al.
Published: (2023-04-01) -
A security method of hardware Trojan detection using path tracking algorithm
by: Der-Chen Huang, et al.
Published: (2022-09-01) -
Watermarking Hardware IPs Using Design Parameter Driven Encrypted Dispersion Matrix With Eigen Decomposition Based Security Framework
by: Anirban Sengupta, et al.
Published: (2024-01-01)