Author List
Japanese Page
SITE TOP
Login
To browse Full-Text PDF.
>
Forgotten your password?
Menu
Search
Full-Text Search
Search(JPN)
Latest Issue
A Fundamentals
Trans.Fundamentals.
JPN Edition(in Japanese)
B Communications
Trans.Commun.
JPN Edition(in Japanese)
C Electronics
Trans.Electron.
JPN Edition(in Japanese)
D Information & Systems
Trans.Inf.&Syst.
JPN Edition(in Japanese)
Abstracts of JPN Edition
Trans.Fundamentals.
Trans.Commun.
Trans.Electron.
Trans.Inf.&Syst.
-
Archive
Volume List
Trans.Fundamentals.
Trans.Commun.
Trans.Electron.
Trans.Inf.&Syst.
Transactions (1976-1990)
Volume List [JPN Edition]
A JPN Edition(in Japanese)
B JPN Edition(in Japanese)
C JPN Edition(in Japanese)
D JPN Edition(in Japanese)
-
Editorial Board
Editorial Board
Trans.Fundamentals.
Trans.Commun.
Trans.Electron.
Trans.Inf.&Syst.
Archive
Editorial Board[JPN Edition]
A JPN Edition(in Japanese)
B JPN Edition(in Japanese)
C JPN Edition(in Japanese)
D JPN Edition(in Japanese)
Archive
-
Open Access Papers
Trans. Commun. (Free)
Trans. Commun.
Trans. Commun.(JPN Edition)
Trans. Electron. (Free)
Trans. Electron.
Trans. Electron.(JPN Edition)
Trans. Inf.&Syst. (Free)
Trans. Inf.&Syst.
Trans. Inf.&Syst.(JPN Edition)
-
Link
Subscription
For Authors
Statistics:
Accepting ratio,review period etc.
IEICE Home Page
-
Others
Citation Index
Privacy Policy
Copyright & Permissions
Copyright (c) by IEICE
Mingfu XUE
Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique
Mingfu XUE
Wei LIU
Aiqun HU
Youdong WANG
Publication:
IEICE TRANSACTIONS on Information and Systems
Publication Date:
2014/03/01
Vol.
E97-D
No.
3
pp.
606-609
Type of Manuscript:
LETTER
Category:
Dependable Computing
Keyword:
information security
,
hardware security
,
hardware Trojan detection
,
unified subspace technique
,
time domain constrained estimator
,
Summary
|
Full Text:PDF
Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy
Mingfu XUE
Aiqun HU
Chunlong HE
Publication:
IEICE TRANSACTIONS on Information and Systems
Publication Date:
2012/06/01
Vol.
E95-D
No.
6
pp.
1694-1697
Type of Manuscript:
LETTER
Category:
Dependable Computing
Keyword:
Multi-Level Security policy
,
security model
,
confidentiality and integrity
,
least privilege
,
application-oriented logic
,
Summary
|
Full Text:PDF