Securing Hardware Accelerators for CE Systems Using Biometric Fingerprinting
Citations
25 citations
6 citations
6 citations
Cites background or methods from "Securing Hardware Accelerators for ..."
...COMPARISON OF PC WITH RESPECT TO RELATED WORK [4]...
[...]
...DESIGN COST COMPARISON OF THE PROPOSED FACIAL BIOMETRIC APPROACH WITH FINGERPRINT BIOMETRIC APPROACH [4] AND BASELINE...
[...]
...In addition, a fraud IP user may dishonestly claim the IP ownership [4]....
[...]
...In addition, Table VII compares the “Pc” of proposed approach with fingerprint biometric-based hardware security approach [4]....
[...]
...3029245 synthesized into hardware using high-level synthesis (HLS) phase of VLSI design process [4]....
[...]
4 citations
Cites background from "Securing Hardware Accelerators for ..."
...Additionally, security of hardware accelerators [5], [6] used in CE systems is also relevant, especially from the perspective of end consumer safety, due to possible secret Trojan insertions (malicious logic) that poses threat to safety and reliability....
[...]
2 citations
References
468 citations
"Securing Hardware Accelerators for ..." refers background in this paper
...which compose of various multivendor third-party intellectual property (3PIP) cores [1]....
[...]
287 citations
152 citations
143 citations
Additional excerpts
...pixel P , the CN is defined as follows [21]:...
[...]
137 citations