Yong C. Kim

According to our database1, Yong C. Kim authored at least 20 papers between 1992 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Functional polymorphism for intellectual property protection.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

2012
Intrinsic Physical-Layer Authentication of Integrated Circuits.
IEEE Trans. Inf. Forensics Secur., 2012

Evaluating component hiding techniques in circuit topologies.
Proceedings of IEEE International Conference on Communications, 2012

2011
Deterministic circuit variation for anti-tamper applications.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Using logic-based reduction for adversarial component recovery.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

A Java based component identification tool for measuring the strength of circuit protections.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Creating a Unique Digital Fingerprint using Existing Combinational Logic.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

Dynamic Polymorphic Reconfiguration for anti-tamper circuits.
Proceedings of the 19th International Conference on Field Programmable Logic and Applications, 2009

Increasing stability and distinguishability of the digital fingerprint in FPGAs through input word analysis.
Proceedings of the 19th International Conference on Field Programmable Logic and Applications, 2009

2008
A dynamically reconfigurable Field Programmable Gate Array hardware foundation for security applications.
Proceedings of the 2008 International Conference on Field-Programmable Technology, 2008

Creating digital fingerprints on commercial field programmable gate arrays.
Proceedings of the 2008 International Conference on Field-Programmable Technology, 2008

Creating unique identifiers on field programmable gate arrays using natural processing variations.
Proceedings of the FPL 2008, 2008

2007
A Cache Architecture for Extremely Unreliable Nanotechnologies.
IEEE Trans. Reliab., 2007

A Method and FPGA Architecture for Real-Time Polymorphic Reconfiguration.
Proceedings of the 2007 International Conference on Field-Programmable Technology, 2007

2006
Constant amplitude multi-code CDMA with built-in single parity check product code.
IEEE Commun. Lett., 2006

Characterization of In-Phase/Quad-Phase Digital Downconversion Via Special Sampling Scheme.
Proceedings of the 13th IEEE International Conference on Electronics, 2006

Decoy circuits for FPGA design protection.
Proceedings of the 2006 IEEE International Conference on Field Programmable Technology, 2006

2002
Two-Step Detection Algorithm in a HVS-Based Blind Watermarking of Still Images.
Proceedings of the Digital Watermarking, First International Workshop, 2002

1993
An integrated motion analysis system guided by feedback information.
Proceedings of the Conference on Computer Vision and Pattern Recognition, 1993

1992
Refinement of noisy correspondence using feedback from 3D motion.
Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1992


  Loading...