Title | (Invited Paper) Hardware Security Strategies Exploiting Nanoelectronic Circuits |
Author | Garrett S. Rose (Air Force Research Laboratory, U.S.A.), *Jeyavijayan Rajendran (New York Univ., U.S.A.), Nathan McDonald (Air Force Research Laboratory, U.S.A.), Ramesh Karri (New York Univ., U.S.A.), Miodrag Potkonjak (Univ. of California, Los Angeles, U.S.A.), Bryant Wysocki (Air Force Research Laboratory, U.S.A.) |
Page | pp. 368 - 372 |
Detailed information (abstract, keywords, etc) |
Title | (Invited Paper) Can We Identify Smartphone App by Power Trace? |
Author | Mian Dong, Po-Hsiang Lai, *Zhu Li (Samsung Telecommunications America, U.S.A.) |
Page | pp. 373 - 375 |
Detailed information (abstract, keywords, etc) |
Title | (Invited Paper) Secure Storage System and Key Technologies |
Author | *Jiwu Shu, Zhirong Shen, Wei Xue, Yingxun Fu (Tsinghua Univ., China) |
Page | pp. 376 - 383 |
Detailed information (abstract, keywords, etc) | |
Slides |
Title | (Invited Paper) Mobile User Classification and Authorization Based on Gesture Usage Recognition |
Author | *Kent W. Nixon, Xiang Chen, Zhi-Hong Mao (Univ. of Pittsburgh, U.S.A.), Kang Li (Rutgers Univ., U.S.A.), Yiran Chen (Univ. of Pittsburgh, U.S.A.) |
Page | pp. 384 - 389 |
Detailed information (abstract, keywords, etc) |