Please login to create your UC TechAlerts.
Request a new password for
Required
In-Sensor Hardware-Software Co-Design Methodology of the Hall Effect Sensors to Prevent and Contain the EMI Spoofing Attacks
Librando: Transparent Code Randomization For Just-In-Time Compilers
Defending Side Channel Attack In Additive Layer Manufacturing Systems
Referenceless Clock Recovery Circuit with Wide Frequency Acquisition Range
Cacophony: A Framework for Next Generation Software Sensors
Cost-Efficient Repair For Cloud Storage Systems Using Progressive Engagement
HCLR: A Hybrid Cross-Layer Routing Protocol For MANETs
CMOS Linear Differential Distributed Amplifier and Distributed Active Balun
Transaction Verification On Rfid-Enabled Payment And Transaction Instruments
HDRL: Homogeneous Dual-Rail Logic For DPA Attack Resistive Secure Circuit Design
Software And Hardware Methods For Multi-Variant Parallel Program Execution To Detect, Quarantine And Repair Malicious Code Injection
RFID Reader Revocation Checking Using Low Power Attached Displays
Filtering Sources Of Unwanted Traffic