We've updated our Privacy Policy to make it clearer how we use your personal data.

We use cookies to provide you with a better experience, read our Cookie Policy

Algorithm Protects Hardware From Attack

News   Mar 04, 2019 | Original Press Release from the University of Cincinnati

 
Algorithm Protects Hardware From Attack

A University of Cincinnati student works on hardware in UC's Digital Design Environments Laboratory. Credit: Corrie Stookey/UC College of Engineering and Applied Science

 
 
 

RELATED ARTICLES

Technique Could Check Integrity of Computer Chips and Detect Tampering

News

A novel technique would allow organizations to non-destructively scan computer chips to ensure that they haven’t been altered and that they are manufactured to design specifications without error.

READ MORE

Algorithm Innovation Solves 50-year Puzzle in Signal Processing

News

Researchers have come up with a long-sought after algorithm, called the inverse chirp z-transform (ICZT).

READ MORE

Navigating “Neuralville”

News

A new study designed experiments involving a simulated town to gain insights into the systems used by the brain to perceive our environment.

READ MORE

 

To personalize the content you see on Technology Networks homepage, Log In or Subscribe for Free

LOGIN SUBSCRIBE FOR FREE