Login / Signup
Hardware Security in Spin-based Computing-in-memory: Analysis, Exploits, and Mitigation Techniques.
Xueyan Wang
Jianlei Yang
Yinglin Zhao
Xiaotao Jia
Gang Qu
Weisheng Zhao
Published in:
ACM J. Emerg. Technol. Comput. Syst. (2020)
Keyphrases
</>
real time
statistical analysis
image processing
hardware and software
security policies
computing power
low cost
access control
memory management