File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TMSCS.2016.2609298
- Scopus: eid_2-s2.0-84994291505
- WOS: WOS:000456838300001
Supplementary
- Citations:
- Appears in Collections:
Article: Guest Editorial: Hardware/Software Cross-Layer Technologies for Trustworthy and Secure Computing
Title | Guest Editorial: Hardware/Software Cross-Layer Technologies for Trustworthy and Secure Computing |
---|---|
Authors | |
Issue Date | 2016 |
Citation | IEEE Transactions on Multi-Scale Computing Systems, 2016, v. 2, n. 3, p. 144-145 How to Cite? |
Persistent Identifier | http://hdl.handle.net/10722/336168 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hu, Shiyan | - |
dc.contributor.author | Jin, Yier | - |
dc.contributor.author | Heffner, Kenneth | - |
dc.contributor.author | Tehranipoor, Mark | - |
dc.date.accessioned | 2024-01-15T08:24:07Z | - |
dc.date.available | 2024-01-15T08:24:07Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | IEEE Transactions on Multi-Scale Computing Systems, 2016, v. 2, n. 3, p. 144-145 | - |
dc.identifier.uri | http://hdl.handle.net/10722/336168 | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE Transactions on Multi-Scale Computing Systems | - |
dc.title | Guest Editorial: Hardware/Software Cross-Layer Technologies for Trustworthy and Secure Computing | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/TMSCS.2016.2609298 | - |
dc.identifier.scopus | eid_2-s2.0-84994291505 | - |
dc.identifier.volume | 2 | - |
dc.identifier.issue | 3 | - |
dc.identifier.spage | 144 | - |
dc.identifier.epage | 145 | - |
dc.identifier.eissn | 2332-7766 | - |
dc.identifier.isi | WOS:000456838300001 | - |