Computer Science ›› 2013, Vol. 40 ›› Issue (8): 149-150.
Previous Articles Next Articles
LI Lei,CHEN Jing and ZHANG Zhi-hong
[1] Lysaght P,Stockwood J.A simulation tool for dynamicallyreconfigurable field programmable gate arrays[J].IEEE Tran-sactions on Very Large Scale Integration(VLSI)Systems,1996,4(3):381-390 [2] Upegui A,Pea-Reyes C A,Sanchez E.An FPGA platform for on-line topology exploration of spiking neural networks[J].Microprocessors and microsystems,2005,29(5):211-223 [3] Upegui A,Pea-Reyes C A,Sanchez E.A methodology for evolving spiking neural-network topologies on line using partial dynamic reconfiguration[C]∥International Conference on Computational Intelligenc.Medellin,Colombia,2003 [4] Devic F,Torres L,Badrignans B.Secure protocol implementation for remote bitstream update preventing replay attacks on FPGA[C]∥2010International Conference on Field Programmable Logic and Applications(FPL).IEEE,2010:179-182 [5] Actel.ProASIC3Handbook.2008.www.actel.com/documents/PA3_HB.pdf [6] Badrignans B,Elbaz R,Torres L.Secure FPGA configurationtechnique preventing system downgrade[C]∥Proceedings of the 18th International Conference on Field Programmable Logic and Applications(FPL’08).2008 [7] Drimer S.Volatile FPGA design security-a survey[M].IEEEComputer Society Annual Volume,2008:292-297 [8] Lamport L.Password authentication with insecure communication[J].Communications of the ACM,1981,24(11):770-772 [9] Cederquist J,Dashti M T,Mauw S.A certified email protocol using key chains[C]∥Advanced Information Networking and Applications Workshops,2007,AINAW’07.21st International Conference on.IEEE,2007:525-530 [10] 李磊,谭新莲,王育民.密钥链多方非否认协议[J].计算机科学,2009,36(010):89-90 |
No related articles found! |
|