Art
J-GLOBAL ID:202002256831064463   Reference number:20A0855643

Graph Similarity and its Applications to Hardware Security

グラフ類似性とそのハードウェアセキュリティへの応用【JST・京大機械翻訳】
Author (5):
Material:
Volume: 69  Issue:Page: 505-519  Publication year: 2020 
JST Material Number: C0233A  ISSN: 0018-9340  CODEN: ICTOB4  Document type: Article
Article type: 原著論文  Country of issue: United States (USA)  Language: ENGLISH (EN)
Abstract/Point:
Abstract/Point
Japanese summary of the article(about several hundred characters).
All summary is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
Hardware reverse engineering i...
   To see more with JDream III (charged).   {{ this.onShowAbsJLink("http://jdream3.com/lp/jglobal/index.html?docNo=20A0855643&from=J-GLOBAL&jstjournalNo=C0233A") }}
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
, 【Automatic Indexing@JST】
JST classification (3):
JST classification
Category name(code) classified by JST.
Operating systems  ,  Basics of graph theory  ,  Theory of computation 
Terms in the title (5):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page