Sign in

Hardware Security in Spin-based Computing-in-memory: Analysis, Exploits, and Mitigation Techniques.

Xueyan WangJianlei YangYinglin ZhaoXiaotao JiaGang QuWeisheng Zhao
Published in: ACM J. Emerg. Technol. Comput. Syst. (2020)
Keyphrases
  • real time
  • statistical analysis
  • image processing
  • hardware and software
  • security policies
  • computing power
  • low cost
  • access control
  • memory management